translate 2

This commit is contained in:
Carlos Polop
2025-01-01 21:36:26 +01:00
parent d0b9174054
commit 2beb8398a6
250 changed files with 0 additions and 256 deletions

View File

@@ -35,4 +35,3 @@ Or just remove the use of API keys.

View File

@@ -45,4 +45,3 @@ By default this is disabled:

View File

@@ -66,4 +66,3 @@ The compromised instances or Lambda functions can periodically check the C2 tabl

View File

@@ -57,4 +57,3 @@ Create a peering connection between the victim VPC and the attacker VPC so he wi

View File

@@ -100,4 +100,3 @@ aws ecr put-replication-configuration \

View File

@@ -102,4 +102,3 @@ aws ecs create-service --service-name "undocumented-service" --task-definition "

View File

@@ -24,4 +24,3 @@ You could **create an access point** (with root access to `/`) accessible from a

View File

@@ -80,4 +80,3 @@ aws elasticbeanstalk update-environment --environment-name my-env --option-setti

View File

@@ -52,4 +52,3 @@ If the account is already trusting a common identity provider (such as Github) t

View File

@@ -42,4 +42,3 @@ aws kms list-grants --key-id <key-id>

View File

@@ -67,4 +67,3 @@ Here you have some ideas to make your **presence in AWS more stealth by creating

View File

@@ -45,4 +45,3 @@ The tool [**lambda-spy**](https://github.com/clearvector/lambda-spy) was created

View File

@@ -133,4 +133,3 @@ aws lambda remove-layer-version-permission --layer-name ExternalBackdoor --state

View File

@@ -36,4 +36,3 @@ If domains are configured:

View File

@@ -34,4 +34,3 @@ aws rds modify-db-snapshot-attribute --db-snapshot-identifier <snapshot-name> --

View File

@@ -28,4 +28,3 @@ Although usually ACLs of buckets are disabled, an attacker with enough privilege

View File

@@ -56,4 +56,3 @@ def generate_password():

View File

@@ -84,4 +84,3 @@ aws sns subscribe --region <region> \

View File

@@ -42,4 +42,3 @@ The following policy gives everyone in AWS access to everything in the queue cal

View File

@@ -24,4 +24,3 @@ If the AWS account is using aliases to call step functions it would be possible

View File

@@ -134,4 +134,3 @@ Write-Host "Role juggling check complete."