Skip to content

This project showcases vulnerable cloud file storage on AWS S3, aiming to help developers and cloud security engineers understand security flaws when building web apps allowing file uploads to Amazon S3.

Notifications You must be signed in to change notification settings

goodycy3/Vulnerable-Cloud-File-Storage-on-AWS-S3

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

4 Commits
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Vulnerable-Cloud-File-Storage-on-AWS-S3

This project demonstrates the implementation of vulnerable cloud file storage on AWS S3. Its primary purpose is to assist developers and cloud security engineers in comprehending security vulnerabilities when creating a web application that enables users to upload and store files on Amazon S3.

In the rush to meet deadlines and without adequate knowledge of AWS security best practices, developers often end up misconfiguring the S3 bucket. This misconfiguration can lead to serious security vulnerabilities, potentially exposing sensitive data and making it susceptible to unauthorized access or data breaches.

🚀 PART A: Setting up an AWS S3 Bucket
🚀 PART B: Setting up Flask in VS Code
🚀 PART C: Setting up the Web Page
🚀 Secure Implementation of Cloud File Upload on S3

💡 Check Complete Walkthrough Here 👈🔻 💡

Security Recommendation

📍 PART A Solution (S3 Bucket Securtiy Measures)
📍 PART B & C Solution (Application Securtiy Measures)

Related Resources

📍 Exploiting Misconfigured S3 Bucket in AWS Lab Series by Flaws.cloud
📍 Creating a secure S3 bucket
📍 Restricting Access to AWS S3 Buckets using ACL and Bucket Policy

About

This project showcases vulnerable cloud file storage on AWS S3, aiming to help developers and cloud security engineers understand security flaws when building web apps allowing file uploads to Amazon S3.

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published