mirror of
https://github.com/HackTricks-wiki/hacktricks-cloud.git
synced 2026-01-11 20:45:21 -08:00
translate 2
This commit is contained in:
@@ -4,5 +4,3 @@
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
@@ -149,4 +149,3 @@ aws apigateway create-usage-plan-key --usage-plan-id $USAGE_PLAN --key-id $API_K
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
@@ -34,4 +34,3 @@ You can check the [**tf code to recreate this scenarios here**](https://github.c
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
@@ -87,4 +87,3 @@ aws codebuild delete-source-credentials --arn <value>
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
@@ -191,4 +191,3 @@ aws codebuild start-build --project-name <proj-name>
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
@@ -23,4 +23,3 @@ aws controltower enable-control --control-identifier <arn_control_id> --target-i
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
@@ -98,4 +98,3 @@ A template for the policy document can be seen here:
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
@@ -352,4 +352,3 @@ bashCopy codeaws dynamodbstreams get-records \
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
@@ -480,4 +480,3 @@ if __name__ == "__main__":
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
@@ -144,4 +144,3 @@ You can use this tool to automate the attack: [https://github.com/Static-Flow/Cl
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
@@ -18,4 +18,3 @@ For more information and access to the [**malmirror script**](https://github.com
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
@@ -99,4 +99,3 @@ aws ecr-public batch-delete-image --repository-name your-ecr-repo-name --image-i
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
@@ -66,4 +66,3 @@ The EC2 instance will probably also have the permission `ecr:GetAuthorizationTok
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
@@ -57,4 +57,3 @@ aws efs delete-access-point --access-point-id <value>
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
@@ -158,4 +158,3 @@ So, if an **attacker compromises a cluster using fargate** and **removes all the
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
@@ -83,4 +83,3 @@ aws elasticbeanstalk remove-tags --resource-arn arn:aws:elasticbeanstalk:us-west
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
@@ -106,4 +106,3 @@ A common way to avoid Confused Deputy problems is the use of a condition with `A
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
@@ -136,4 +136,3 @@ aws kms schedule-key-deletion \
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
@@ -32,4 +32,3 @@ Abusing Lambda Layers it's also possible to abuse extensions and persist in the
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
@@ -66,4 +66,3 @@ For more info check [https://github.com/carlospolop/lambda_bootstrap_switcher](h
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
@@ -33,4 +33,3 @@ Check out the Lightsail privesc options to learn different ways to access potent
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
@@ -22,4 +22,3 @@ aws organizations deregister-account --account-id <account_id> --region <region>
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
@@ -95,4 +95,3 @@ aws rds start-export-task --export-task-identifier attacker-export-task --source
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
@@ -41,4 +41,3 @@ Finally, the attacker could upload a final file, usually named "ransom-note.txt,
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
@@ -52,4 +52,3 @@ aws secretsmanager delete-secret \
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
@@ -86,4 +86,3 @@ Still to test.
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
@@ -83,4 +83,3 @@ aws sns untag-resource --resource-arn <value> --tag-keys <key>
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
@@ -90,4 +90,3 @@ arduinoCopy codeaws sqs remove-permission --queue-url <value> --label <value>
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
@@ -28,4 +28,3 @@ aws sso-admin delete-account-assignment --instance-arn <SSOInstanceARN> --target
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
@@ -77,4 +77,3 @@ aws stepfunctions untag-resource --resource-arn <value> --tag-keys <key>
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
@@ -51,7 +51,6 @@ resp=$(curl -s "$federation_endpoint" \
|
||||
signin_token=$(echo -n $resp | jq -r '.SigninToken' | tr -d '\n' | jq -sRr @uri)
|
||||
|
||||
|
||||
|
||||
# Give the URL to login
|
||||
echo -n "https://signin.aws.amazon.com/federation?Action=login&Issuer=example.com&Destination=https%3A%2F%2Fconsole.aws.amazon.com%2F&SigninToken=$signin_token"
|
||||
```
|
||||
@@ -107,4 +106,3 @@ response = client.get_secret_value(SecretId="flag_secret") print(response['Secre
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
@@ -16,4 +16,3 @@ For more information:
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
Reference in New Issue
Block a user