translate 2

This commit is contained in:
Carlos Polop
2025-01-01 21:36:26 +01:00
parent d0b9174054
commit 2beb8398a6
250 changed files with 0 additions and 256 deletions

View File

@@ -149,4 +149,3 @@ aws apigateway create-usage-plan-key --usage-plan-id $USAGE_PLAN --key-id $API_K

View File

@@ -34,4 +34,3 @@ You can check the [**tf code to recreate this scenarios here**](https://github.c

View File

@@ -87,4 +87,3 @@ aws codebuild delete-source-credentials --arn <value>

View File

@@ -191,4 +191,3 @@ aws codebuild start-build --project-name <proj-name>

View File

@@ -23,4 +23,3 @@ aws controltower enable-control --control-identifier <arn_control_id> --target-i

View File

@@ -98,4 +98,3 @@ A template for the policy document can be seen here:

View File

@@ -352,4 +352,3 @@ bashCopy codeaws dynamodbstreams get-records \

View File

@@ -144,4 +144,3 @@ You can use this tool to automate the attack: [https://github.com/Static-Flow/Cl

View File

@@ -18,4 +18,3 @@ For more information and access to the [**malmirror script**](https://github.com

View File

@@ -99,4 +99,3 @@ aws ecr-public batch-delete-image --repository-name your-ecr-repo-name --image-i

View File

@@ -66,4 +66,3 @@ The EC2 instance will probably also have the permission `ecr:GetAuthorizationTok

View File

@@ -57,4 +57,3 @@ aws efs delete-access-point --access-point-id <value>

View File

@@ -158,4 +158,3 @@ So, if an **attacker compromises a cluster using fargate** and **removes all the

View File

@@ -83,4 +83,3 @@ aws elasticbeanstalk remove-tags --resource-arn arn:aws:elasticbeanstalk:us-west

View File

@@ -106,4 +106,3 @@ A common way to avoid Confused Deputy problems is the use of a condition with `A

View File

@@ -136,4 +136,3 @@ aws kms schedule-key-deletion \

View File

@@ -32,4 +32,3 @@ Abusing Lambda Layers it's also possible to abuse extensions and persist in the

View File

@@ -66,4 +66,3 @@ For more info check [https://github.com/carlospolop/lambda_bootstrap_switcher](h

View File

@@ -33,4 +33,3 @@ Check out the Lightsail privesc options to learn different ways to access potent

View File

@@ -22,4 +22,3 @@ aws organizations deregister-account --account-id <account_id> --region <region>

View File

@@ -95,4 +95,3 @@ aws rds start-export-task --export-task-identifier attacker-export-task --source

View File

@@ -41,4 +41,3 @@ Finally, the attacker could upload a final file, usually named "ransom-note.txt,

View File

@@ -52,4 +52,3 @@ aws secretsmanager delete-secret \

View File

@@ -83,4 +83,3 @@ aws sns untag-resource --resource-arn <value> --tag-keys <key>

View File

@@ -90,4 +90,3 @@ arduinoCopy codeaws sqs remove-permission --queue-url <value> --label <value>

View File

@@ -28,4 +28,3 @@ aws sso-admin delete-account-assignment --instance-arn <SSOInstanceARN> --target

View File

@@ -77,4 +77,3 @@ aws stepfunctions untag-resource --resource-arn <value> --tag-keys <key>

View File

@@ -51,7 +51,6 @@ resp=$(curl -s "$federation_endpoint" \
signin_token=$(echo -n $resp | jq -r '.SigninToken' | tr -d '\n' | jq -sRr @uri)
# Give the URL to login
echo -n "https://signin.aws.amazon.com/federation?Action=login&Issuer=example.com&Destination=https%3A%2F%2Fconsole.aws.amazon.com%2F&SigninToken=$signin_token"
```
@@ -107,4 +106,3 @@ response = client.get_secret_value(SecretId="flag_secret") print(response['Secre