Skip to main content

BuckHacker: This Search Engine Lets You Find Hackable Servers With Ease


Leaving private data on exposed AWS servers isn’t as rare as you might think. Security researchers and hackers can access such data with ease using appropriate tools. To make this process even easier, some developers have created a tool named BuckHacker, which lets one search for such exposed servers.
In the past, you must have read about Shodan–the hackers’ search engine. BuckHacker is another interesting tool that can be used to test the security measures employed by web servers without any prior expertise in the IT security field.
In an email to Motherboard, the anonymous devs underlined the inspiration behind this project. They aim to increase the security associated with the code repositories and projects. “Too many companies was [sic] hit for having wrong permissions on buckets in the last years,” they added.
This search engine lets one search for hackable servers using bucket name or by filename. Moreover, it also returns entries labeled as “Access Denied” and “The specified bucket does not exist.” This feature can confirm that the target is using Amazon’s services.
It collects bucket names and their index pages. The results are stored in a database, which can be searched later by other users. As per the devs, the project is currently in the early stages of development and it’s pretty unstable.
At the moment, there isn’t any information on BuckHacker’s launch or any other related details. In case we come across more relevant information, we’ll be updating this article. Stay tuned.
YOU MAY ALSO LIKE :
Download 10 Best Android Hacking Apps for Android Mobile

Comments

Popular posts from this blog

Chrome Web Browser Will Now Use 10% More RAM With Spectre Fix

A new security feature named ‘Site Isolation’ has been introduced for Google Chrome 67 which would nullify the effects of speculative execution side-channel attacks like Spectre. To put things to the perspective, Spectre is one of the two fundamental design flaws in the  modern processors, which allow programs to get access to the data for which it is not authorized. Malicious data can exploit this flaw to steal your password and other personal information. What is Site Isolation? The new Site Isolation feature introduced in Google Chrome 67 brings about a fundamental change to Chrome’s architecture. Now, Chrome has changed how its multi-process architecture worked and different tabs used different render processes. According to the new architecture, Chrome limits each renderer process to a single site. By this separation of processes, Google aims to prevent direct memory reading across different processes to safeguard users’ data. According to G...

Google starts rolling out ‘Call Screen’ feature for Pixel smartphones

San Francisco, Dec 2 (IANS) Google has started rolling out a feature for its Pixel smartphones that lets users make use of the Google Assistant to see who is calling and why before they answer a call. The feature allows users to see a real-time transcript of how the caller responds so that they can then decide whether to pick up, respond by tapping a quick reply (for example, “I’ll call you back later”), or mark the call as spam and dismiss. “Call Screen is only available to English speakers in the United States who have Pixel 2, 2 XL, 3, or 3XL devices. If you don’t see Call Screen in the Phone app’s settings, it’s not available yet,” Google said. Call Screen, which can help users save the time spent on picking up unimportant calls from unknown numbers, does not use Wi-Fi or mobile data of the user. This feature does not work with third-party call recording and screen recording apps as these apps may interfere with how the feature works. It is better to turn off these app...

Amazon, Reddit And Others Fail To Warn Us About Dumb Passwords

B elieve it or not, there is still a large number of people who use passwords such as “password,” “password123”, “[dog’s name]1” and others along the same lines. And in the era of sophisticated hacking, these passwords are not exactly “safe.” Before me, this is the first thing websites should inform you while setting up a password. But apparently, many big names are not doing enough to encourage non-terrible passwords, according to  the new research . Steve Furnell from the University of Plymouth has been keeping tabs on the websites like Amazon, Reddit, and Wikipedia for many years, carrying out similar assessments in 2007, 2011 and 2014. His 2018 survey examined practices of Google, Facebook, Wikipedia, Reddit, Yahoo, Amazon, Twitter, Instagram, Microsoft Live, and Netflix. The study concluded that Amazon had the worst performance among all the names. It nearly accepted every kind of password of any length. On the other hand, Yahoo and Wikip...