Skip to content

festin

S3 bucket weakness discovery

PythonGitHub

Description

festin discovers open S3 buckets by analyzing DNS CNAME records, crawling web pages, and performing smart brute forcing. It identifies publicly accessible buckets and can download their contents for analysis.

Installation

BASH
pip3 install festin

Basic Usage

BASH
# Discover S3 buckets for domain
festin target.com

# From file
festin -f domains.txt

Advanced Usage

BASH
# With DNS analysis
festin target.com --dns

# Crawl mode
festin target.com --crawl --depth 3

# Output results
festin target.com -o results.json

# Custom concurrency
festin target.com -c 20

# Download discovered bucket contents
festin target.com --download

Common Workflows

BASH
# Full S3 discovery
festin target.com --dns --crawl --depth 3 -o s3_findings.json

# Verify discovered buckets
aws s3 ls s3://bucket-name --no-sign-request
aws s3 cp s3://bucket-name/sensitive-file.txt ./