Description
festin discovers open S3 buckets by analyzing DNS CNAME records, crawling web pages, and performing smart brute forcing. It identifies publicly accessible buckets and can download their contents for analysis.
Installation
BASH
pip3 install festin
Basic Usage
BASH
# Discover S3 buckets for domain
festin target.com
# From file
festin -f domains.txt
Advanced Usage
BASH
# With DNS analysis
festin target.com --dns
# Crawl mode
festin target.com --crawl --depth 3
# Output results
festin target.com -o results.json
# Custom concurrency
festin target.com -c 20
# Download discovered bucket contents
festin target.com --download
Common Workflows
BASH
# Full S3 discovery
festin target.com --dns --crawl --depth 3 -o s3_findings.json
# Verify discovered buckets
aws s3 ls s3://bucket-name --no-sign-request
aws s3 cp s3://bucket-name/sensitive-file.txt ./