How to find unsecured S3 buckets: some useful tools

Services like Amazon’s S3 have made it easier and cheaper than ever to store large quantities of data in the cloud. Used properly, S3 buckets are a useful tool, however a lot of companies fail to implement basic security resulting in catastrophic data breaches.

Nmap: my own cheatsheet

Nmap is the most known port scanner, written and maintained by Gordon Lyon (Fyodor). It can be used for network discovery and for most security enumeration during the initial stages of penetration testing.

Some thought about network printers security

Network printers use a various amount of protocols and firmwares which differ from vendor to vendor and model to model. Obviously, every firmware (and protocol) could be vulnerable and exploitable but, a printer could be an attack vector?