Skip to content

Commit 59f777f

Browse files
Merge pull request #4 from scope-forensics/development
Development
2 parents 1e280bc + 656cf3b commit 59f777f

File tree

6 files changed

+1043
-8
lines changed

6 files changed

+1043
-8
lines changed

README.md

Lines changed: 72 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,14 @@
11
# Scope - Cloud Forensics Tool
22

3-
Scope is an open source tool for collecting and analyzing cloud logs for forensic investigations. Scope currently supports AWS CloudTrail logs with plans to extend to Azure and GCP in the future.
3+
Scope is an Open Source Cloud Forensics tool for AWS. Scope can rapidly obtain logs, discover resources, and create super timelines for analysis.
44

55
## Features
66

77
- **AWS CloudTrail Collection**: Retrieve logs from S3 buckets or via the Management Events API
88
- **Normalized Timeline**: Convert cloud logs into a standardized timeline format
99
- **Multiple Export Formats**: Export timelines as CSV or JSON
10-
- **Resource Discovery**: Identify available CloudTrail trails in your AWS account
10+
- **Resource Discovery**: Identify available CloudTrail trails and AWS resources in your account
11+
- **Credential Reports**: Generate and analyze IAM credential reports for security assessment
1112

1213
## Installation
1314

@@ -97,7 +98,14 @@ To use Scope effectively, you'll need an AWS user with appropriate permissions.
9798
"cloudtrail:DescribeTrails",
9899
"s3:GetObject",
99100
"s3:ListBucket",
100-
"s3:GetBucketLocation"
101+
"s3:GetBucketLocation",
102+
"ec2:DescribeInstances",
103+
"iam:ListUsers",
104+
"iam:ListRoles",
105+
"iam:GenerateCredentialReport",
106+
"iam:GetCredentialReport",
107+
"lambda:ListFunctions",
108+
"rds:DescribeDBInstances"
101109
],
102110
"Resource": "*"
103111
}
@@ -131,6 +139,24 @@ scope aws discover
131139

132140
This command will display information about each trail, including its name, S3 bucket location, and whether it logs management events.
133141

142+
### Discover AWS Resources
143+
144+
To discover various AWS resources in your account (EC2, S3, IAM, Lambda, RDS):
145+
146+
```bash
147+
# Discover all supported resource types
148+
scope aws discover-resources
149+
150+
# Discover specific resource types
151+
scope aws discover-resources --resource-types ec2 s3 --format json --output-file resources.json
152+
```
153+
154+
Available parameters:
155+
- `--resource-types`: Types of resources to discover (choices: ec2, s3, iam_users, iam_roles, lambda, rds, all)
156+
- `--regions`: Specific AWS regions to search (space-separated)
157+
- `--output-file`: Path to save the output
158+
- `--format`: Output format (choices: json, csv, terminal)
159+
134160
### Explore S3 Bucket Structure
135161

136162
To explore the structure of an S3 bucket and automatically detect CloudTrail logs:
@@ -144,6 +170,49 @@ This command will:
144170
2. Automatically detect potential CloudTrail log paths
145171
3. Provide a ready-to-use command for collecting logs from the detected paths
146172

173+
### Discover AWS Resources
174+
175+
To discover AWS resources in your account:
176+
177+
```bash
178+
# Discover all supported resource types
179+
scope aws discover-resources
180+
181+
# Discover specific resource types
182+
scope aws discover-resources --resource-types lambda rds --regions us-east-1 us-west-2
183+
```
184+
185+
Available parameters:
186+
- `--resource-types`: Types of resources to discover (choices: ec2, s3, iam_users, iam_roles, lambda, rds, all)
187+
- `--regions`: Specific AWS regions to search (space-separated)
188+
- `--output-file`: Path to save the output
189+
- `--format`: Output format (choices: json, csv, terminal)
190+
191+
### Generate IAM Credential Report
192+
193+
To generate and retrieve an IAM credential report:
194+
195+
```bash
196+
# Display credential report in terminal
197+
scope aws credential-report
198+
199+
# Save credential report as CSV
200+
scope aws credential-report --format csv --output-file credentials.csv
201+
202+
# Save credential report as JSON
203+
scope aws credential-report --format json --output-file credentials.json
204+
```
205+
206+
Available parameters:
207+
- `--output-file`: Path to save the output
208+
- `--format`: Output format (choices: json, csv, terminal)
209+
210+
The credential report includes details about IAM users such as:
211+
- Password and access key usage
212+
- MFA status
213+
- Access key rotation dates
214+
- Last activity timestamps
215+
147216
### Collect Management Events
148217

149218
To collect CloudTrail management events:

0 commit comments

Comments
 (0)