translate fix

This commit is contained in:
Carlos Polop
2025-01-01 23:55:17 +01:00
parent 2beb8398a6
commit 4ef00e6b1b
242 changed files with 2 additions and 243 deletions

View File

@@ -14,4 +14,3 @@ In any case, thanks for contributing to HackTricks!

1
.gitignore vendored
View File

@@ -3,7 +3,6 @@
# General
.DS_Store
.AppleDouble

View File

@@ -1,5 +1,5 @@
[book]
authors = ["Carlos Polop"]
authors = ["HackTricks Team"]
language = "en"
multilingual = false
src = "src"

View File

@@ -226,7 +226,7 @@ def copy_dirs(source_path, dest_path):
print(f"Copied .gitbook folder from {source_folder} to {destination_folder}")
def copy_files(source_path, dest_path):
file_names = ["src/SUMMARY.md", "hacktricks-preprocessonr.py", "book.toml", ".gitignore"]
file_names = ["src/SUMMARY.md", "hacktricks-preprocessor.py", "book.toml", ".gitignore"]
for file_name in file_names:
source_filepath = os.path.join(source_path, file_name)
dest_filepath = os.path.join(dest_path, file_name)

View File

@@ -38,4 +38,3 @@ _Hacktricks logos & motion designed by_ [_@ppiernacho_](https://www.instagram.co

View File

@@ -505,4 +505,3 @@

View File

@@ -118,4 +118,3 @@ python rbdel.py -u <workgroup>\\<user> -p <pass> <ip> azureadssosvc$

View File

@@ -69,4 +69,3 @@ Open-AADIntOffice365Portal -ImmutableID qIMPTm2Q3kimHgg4KQyveA== -Issuer "http:/

View File

@@ -32,4 +32,3 @@ az storage queue policy set --name <queue-name> --permissions rwd --expiry 2024-

View File

@@ -42,4 +42,3 @@ az storage blob service-properties delete-policy update \

View File

@@ -26,4 +26,3 @@ An attacker could get access to the instances and backdoor them:

View File

@@ -46,4 +46,3 @@ This would allow to delete objects inside the storage account which might **inte

View File

@@ -49,4 +49,3 @@ This would allow to delete file inside the shared filesystem which might **inter

View File

@@ -18,4 +18,3 @@ For more information about function apps check:

View File

@@ -112,4 +112,3 @@ az keyvault secret restore --vault-name <vault-name> --file <backup-file-path>

View File

@@ -90,4 +90,3 @@ az storage queue policy set --name <queue-name> --permissions rwd --expiry 2024-

View File

@@ -103,4 +103,3 @@ az sql db import --admin-user <admin-user> \

View File

@@ -65,4 +65,3 @@ This would allow to delete file inside the shared filesystem which might **inter

View File

@@ -40,4 +40,3 @@ ssh root@127.0.0.1 -p 39895

View File

@@ -182,4 +182,3 @@ $data = Get-SharePointFilesFromGraph -authentication $token $data[0].downloadUrl

View File

@@ -458,4 +458,3 @@ az functionapp deployment source config \

View File

@@ -35,4 +35,3 @@ az keyvault set-policy \

View File

@@ -74,4 +74,3 @@ az storage queue policy set --name <queue-name> --permissions rwd --expiry 2024-

View File

@@ -155,4 +155,3 @@ az servicebus namespace authorization-rule update \

View File

@@ -112,4 +112,3 @@ az sql server azure-ad-only-auth disable \

View File

@@ -153,4 +153,3 @@ az storage share-rm restore \

View File

@@ -383,4 +383,3 @@ According to the [**docs**](https://learn.microsoft.com/en-us/azure/role-based-a

View File

@@ -74,4 +74,3 @@ def main(req: func.HttpRequest) -> func.HttpResponse:

View File

@@ -53,4 +53,3 @@ docker pull <corp-name>.azurecr.io/<image>:<tag>

View File

@@ -88,7 +88,6 @@ az webapp config storage-account list --name <name> --resource-gl_group
# List all the functions
az functionapp list
@@ -213,4 +212,3 @@ git clone 'https://<username>:<password>@name.scm.azurewebsites.net/repo-name.gi

View File

@@ -41,4 +41,3 @@ Get-ApplicationProxyAssignedUsersAndGroups -ObjectId <object-id>

View File

@@ -32,4 +32,3 @@ cat <PATH TO .json FILE> | Select-String password

View File

@@ -179,4 +179,3 @@ $response = Invoke-WebRequest -Method Post -Uri $uri -Body $body

View File

@@ -66,4 +66,3 @@ The successful execution of this process opens numerous possibilities for furthe

View File

@@ -1032,4 +1032,3 @@ The default mode is **Audit**:

View File

@@ -173,4 +173,3 @@ Same as storage persistence:

View File

@@ -267,4 +267,3 @@ az rest --url "https://management.azure.com/<subscription>/resourceGroups/<res-g

View File

@@ -70,4 +70,3 @@ Get-AzLogicApp -ResourceGroupName <ResourceGroupName> -Name <LogicAppName>

View File

@@ -57,4 +57,3 @@ az group list --subscription "<subscription>" --output table

View File

@@ -96,4 +96,3 @@ $queueMessage.Value

View File

@@ -101,4 +101,3 @@ az servicebus namespace authorization-rule keys list --resource-group <MyResourc

View File

@@ -262,4 +262,3 @@ sqlcmd -S <sql-server>.database.windows.net -U <server-user> -P <server-passwork

View File

@@ -438,4 +438,3 @@ az-file-shares.md

View File

@@ -110,4 +110,3 @@ Same as storage persistence:

View File

@@ -32,4 +32,3 @@ The execution of the script can take up to **one hour**.

View File

@@ -185,4 +185,3 @@ done

View File

@@ -862,4 +862,3 @@ Invoke-AzureRmVMBulkCMD -Script Mimikatz.ps1 -Verbose -output Output.txt

View File

@@ -465,4 +465,3 @@ Get-AzExpressRouteCircuit

View File

@@ -249,4 +249,3 @@ az-password-spraying.md

View File

@@ -152,4 +152,3 @@ Check the Applications and Service Principal sections of the page:

View File

@@ -36,4 +36,3 @@ Invoke-PasswordSprayGmail -UserList .\userlist.txt -Password Fall2016 -Threads 1

View File

@@ -42,4 +42,3 @@ az vm extension image list --publisher "Site24x7" --output table

View File

@@ -44,4 +44,3 @@ do-services/

View File

@@ -136,4 +136,3 @@ The **logs of a team** can be found in [**https://cloud.digitalocean.com/account

View File

@@ -8,4 +8,3 @@ DO doesn't support granular permissions. So the **minimum role** that allows a u

View File

@@ -20,4 +20,3 @@ DO offers a few services, here you can find how to **enumerate them:**

View File

@@ -35,4 +35,3 @@ That will give you a **shell**, and just executing **`env`** you will be able to

View File

@@ -34,4 +34,3 @@ doctl registry repository list-v2

View File

@@ -44,4 +44,3 @@ doctl databases pool list <db-id> # List pools of DB

View File

@@ -82,4 +82,3 @@ It's also possible to launch a **recovery console** to run commands inside the h

View File

@@ -61,4 +61,3 @@ doctl serverless activations result <activation-id> # get only the response resu

View File

@@ -20,4 +20,3 @@ doctl compute image list

View File

@@ -40,4 +40,3 @@ doctl kubernetes cluster list-associated-resources <cluster-id>

View File

@@ -46,4 +46,3 @@ doctl compute firewall remove-droplets <fw-id> --droplet-ids <droplet-id>

View File

@@ -24,4 +24,3 @@ doctl projects resources list <proj-id> # Get all the resources of a project

View File

@@ -47,4 +47,3 @@ aws s3 ls --endpoint=https://fra1.digitaloceanspaces.com s3://uniqbucketname

View File

@@ -16,4 +16,3 @@ compute volume list

View File

@@ -246,4 +246,3 @@ gcloud config unset auth/access_token_file

View File

@@ -231,4 +231,3 @@ As defined by terraform in [https://registry.terraform.io/providers/hashicorp/go

View File

@@ -145,4 +145,3 @@ roles/bigquery.metadataViewer

View File

@@ -22,4 +22,3 @@ Check how to do this in:

View File

@@ -22,4 +22,3 @@ If yoi could just modify the code of a running version or create a new one yo co

View File

@@ -43,4 +43,3 @@ https://book.hacktricks.xyz/pentesting-web/dependency-confusion

View File

@@ -22,4 +22,3 @@ Grant further access over datasets, tables, rows and columns to compromised user

View File

@@ -20,4 +20,3 @@ For more info about Cloud Functions check:

View File

@@ -26,4 +26,3 @@ Create a backdoored Service or Job

View File

@@ -70,4 +70,3 @@ But you can find further information in [https://github.com/FrancescoDiSalesGith

View File

@@ -38,4 +38,3 @@ For more information check the technique in:

View File

@@ -20,4 +20,3 @@ For more informatoin about Compute and VPC (Networking) check:

View File

@@ -54,4 +54,3 @@ gcloud dataflow $NAME_TEMPLATE run testing \

View File

@@ -22,4 +22,3 @@ gcp-filestore-persistence.md

View File

@@ -22,4 +22,3 @@ gcloud logging sinks create <sink-name> <destination> --log-filter="FILTER_CONDI

View File

@@ -105,4 +105,3 @@ Some remediations for these techniques are explained in [https://www.netskope.co

View File

@@ -23,4 +23,3 @@ An attacker could update the secret to:

View File

@@ -39,4 +39,3 @@ Another exploit script for this method can be found [here](https://github.com/Rh

View File

@@ -44,4 +44,3 @@ Modify source code to steal credentials if they are being sent or perform a defa

View File

@@ -22,4 +22,3 @@ The Post Exploitation and Privesc techniques of Artifact Registry were mixed in:

Some files were not shown because too many files have changed in this diff Show More