Research
Security News
Malicious npm Packages Inject SSH Backdoors via Typosquatted Libraries
Socket’s threat research team has detected six malicious npm packages typosquatting popular libraries to insert SSH backdoors.
List all resources in an AWS account, all regions, all services(*). Writes JSON files for further processing.
(*) No guarantees for completeness. Use billing alerts if you are worried about costs.
.. image:: https://img.shields.io/pypi/v/aws-list-all :alt: PyPI :target: https://pypi.org/project/aws-list-all/
.. image:: https://github.com/JohannesEbke/aws_list_all/actions/workflows/tests.yaml/badge.svg :target: https://github.com/JohannesEbke/aws_list_all/actions/workflows/tests.yaml
(Note that the build will break on some boto3 updates)
You need to have python (only python3 tested) as well as AWS credentials set up as usual.
Quick Start with virtualenv::
mkvirtualenv -p $(which python3) aws pip install aws-list-all aws-list-all query --region eu-west-1 --service ec2 --directory ./data/
Quick Start Output::
---------------8<--(snip)--8<------------------- --- ec2 eu-west-1 DescribeVolumes Volumes --- ec2 eu-west-1 DescribeVolumesModifications VolumesModifications --- ec2 eu-west-1 DescribeVpcEndpointConnectionNotifications ConnectionNotificationSet --- ec2 eu-west-1 DescribeVpcEndpointConnections VpcEndpointConnections --- ec2 eu-west-1 DescribeVpcEndpointServiceConfigurations ServiceConfigurations --- ec2 eu-west-1 DescribeVpcEndpoints VpcEndpoints --- ec2 eu-west-1 DescribeVpcPeeringConnections VpcPeeringConnections --- ec2 eu-west-1 DescribeVpcs Vpcs --- ec2 eu-west-1 DescribeVpnConnections VpnConnections --- ec2 eu-west-1 DescribeVpnGateways VpnGateways +++ ec2 eu-west-1 DescribeKeyPairs KeyPairs +++ ec2 eu-west-1 DescribeSecurityGroups SecurityGroups +++ ec2 eu-west-1 DescribeTags Tags !!! ec2 eu-west-1 DescribeClientVpnEndpoints ClientError('An error occurred (InternalError) when calling the DescribeClientVpnEndpoints operation (reached max retries: 4): An internal error has occurred')
Lines start with "---
" if no resources of this type have been found, and
start with "+++
" if at least one resource has been found.
">:|
" denotes an error due to missing permissions, other errors are prefixed with "!!!
",
Currently, some default resources are still considered "user-created" and thus listed, this may change in the future.
Details about found resources are saved in json files named after the service, region, and operation used to find them. They can be dumped with::
aws-list-all show data/ec2_* aws-list-all show --verbose data/ec2_DescribeSecurityGroups_eu-west-1.json
Warning: As AWS has over 1024 API endpoints, aws-list-all tries to increase your allowed number of open files See https://github.com/JohannesEbke/aws_list_all/issues/6
Restricting the region and service is optional, a simple query
without arguments lists everything.
It uses a thread pool to parallelize queries and randomizes the order to avoid
hitting one endpoint in close succession. One run takes around two minutes for me.
Add immediate, more verbose output to a query with --verbose
. Use twice for even more verbosity::
aws-list-all query --region eu-west-1 --service ec2 --operation DescribeVpcs --directory data --verbose
Show resources for all returned queries::
aws-list-all show --verbose data/*
Show resources for all ec2 returned queries::
aws-list-all show --verbose data/ec2*
List available services to query::
aws-list-all introspect list-services
List available operations for a given service, do::
aws-list-all introspect list-operations --service ec2
List all resources in sequence to avoid throttling::
aws-list-all query --parallel 1
FAQs
List all your AWS resources, all regions, all services.
We found that aws-list-all demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
Security News
Socket’s threat research team has detected six malicious npm packages typosquatting popular libraries to insert SSH backdoors.
Security News
MITRE's 2024 CWE Top 25 highlights critical software vulnerabilities like XSS, SQL Injection, and CSRF, reflecting shifts due to a refined ranking methodology.
Security News
In this segment of the Risky Business podcast, Feross Aboukhadijeh and Patrick Gray discuss the challenges of tracking malware discovered in open source softare.