Researchs
  • About Me
  • Bypassing DEP - Increasing the Gap
  • Hijacking Cloud CI/CD Systems for Fun and Profit
  • Found some Access Keys?
  • AWS Cloud Security
    • AWS Cloud Researchs
      • AWS and the Secrets Exposed on Public ECR Repository
    • Hacking API Gateway
      • API Gateway - Security
      • API Gateway API Calls
    • Hacking S3
      • S3 - Security
      • S3 API Calls
    • Hacking Cognito
      • Cognito - Security
      • Cognito - API Calls
    • Hacking Lamda
      • Lambda - Security
      • Lambda - API Calls
    • Hacking Cloudbuild
      • Cloudbuild - Security
      • Cloudbuild - API Calls
    • AWS Services
  • Windows Security Research
    • Exploit Development
      • RTCore64.sys - CVE-2019-16098
      • Mouse Server
      • mskssrv.sys - CVE-2023–29360
    • Fuzzing
      • WTF
  • Supply Chain Research
    • Abusing Netlify Functions
  • Reverse Engineering
    • Reversing.kr
      • Easy_CrackMe
      • Easy KeyGen
  • Failed Research Attempts
    • Github Actions - Cloud
    • CloudTrail
Powered by GitBook
On this page
  1. AWS Cloud Security
  2. Hacking S3

S3 API Calls

S3 API Calls

Here are some popular S3 API calls and what they do :-

  • cp : API call which allows you to download object from S3 bucket.

  • get-bucket-policy : S3API based API call which prints out the bucket policy associated with the bucket.

  • ls : API call that lists all the objects present in the S3 bucket.

  • list-objects : S3API based API call which not only lists all the objects present in the S3 bucket, but also lists down the owner ID and various other details about the object

  • get-object-acl : S3API based API call which prints out the ACL of the specified object of a S3 bucket.

  • get-object :S3API based API call which not only downloads the object but also lists down various other information like meta-data associated with the object.

PreviousS3 - SecurityNextHacking Cognito

Last updated 2 years ago