Sandcastle – AWS S3 Bucket Enumeration Tool


Sandcastle is a Python-based Amazon AWS S3 Bucket Enumeration Tool, formerly known as bucketCrawler. The script takes a target’s name as the stem argument (e.g. shopify) and iterates through a file of bucket name permutations.

Sandcastle - AWS S3 Bucket Enumeration Tool


Amazon S3 [Simple Storage Service] is cloud storage for the Internet. To upload your data (photos, videos, documents etc.), you first create a bucket in one of the AWS Regions. You can then upload any number of objects to the bucket.

In terms of implementation, buckets and objects are resources, and Amazon S3 provides APIs for you to manage them.

Examples of the kinds of bucket names it would look for:

  • -training
  • -bucket
  • -dev
  • -attachments
  • -photos
  • -elasticsearch
  • […]

You can find the example bucket names file here.

Using Sandcastle – AWS S3 Bucket Enumeration Tool

Here’s how to get started:

  • Clone this repo (PyPi distribution temporarily disabled).
  • Run sandcastle.py with a target name and input file (grab an example from this repo)
  • Matching bucket permutations will be identified, and read permissions tested.

Status codes and testing for Sandcastle – AWS S3 Bucket Enumeration Tool

  • 404 – Bucket Not Found – Not a target for analysis (hidden by default)
  • 403 – Access Denied – Potential target for analysis via the CLI
  • 200 – Publicly Accessible – Potential target for analysis via the CLI

You can download Sandcastle here:

sandcastle-1.2.3.zip

Or read more here.

Posted in: Hacking Tools


Latest Posts:


Aclpwn.Py - Exploit ACL Based Privilege Escalation Paths in Active Directory Aclpwn.Py – Exploit ACL Based Privilege Escalation Paths in Active Directory
Aclpwn.py is a tool that interacts with BloodHound< to identify and exploit ACL based privilege escalation paths.
Vulhub - Pre-Built Vulnerable Docker Environments For Learning To Hack Vulhub – Pre-Built Vulnerable Docker Environments For Learning To Hack
Vulhub is an open-source collection of pre-built vulnerable docker environments for learning to hack. No pre-existing knowledge of docker is required, just execute two simple commands.
LibInjection - Detect SQL Injection (SQLi) and Cross-Site Scripting (XSS) LibInjection – Detect SQL Injection (SQLi) and Cross-Site Scripting (XSS)
LibInjection is a C library to Detect SQL Injection (SQLi) and Cross-Site Scripting (XSS) through lexical analysis of real-world Attacks.
Grype - Vulnerability Scanner For Container Images & Filesystems Grype – Vulnerability Scanner For Container Images & Filesystems
Grype is a vulnerability scanner for container images and filesystems with an easy to install binary that supports the packages for most major *nix based OS.
APT-Hunter - Threat Hunting Tool via Windows Event Log APT-Hunter – Threat Hunting Tool via Windows Event Log
APT-Hunter is a threat hunting tool for windows event logs made from the perspective of the purple team mindset to provide detection for APT movements hidden in the sea of windows event logs.
GitLab Watchman - Audit Gitlab For Sensitive Data & Credentials GitLab Watchman – Audit Gitlab For Sensitive Data & Credentials
GitLab Watchman is an app that uses the GitLab API to audit GitLab for sensitive data and credentials exposed internally, this includes code, commits, wikis etc


2 Responses to Sandcastle – AWS S3 Bucket Enumeration Tool

  1. ed May 12, 2020 at 2:38 pm #

    Hi can u send pics of the sandcastles. Still learning 2 build, do u use tools or just hands?

  2. ed May 12, 2020 at 2:40 pm #

    i built 1 out of mud still hoping 2 make it 2 beach this year