From 4ef00e6b1b395d114e2b4a37d5c1b2158178685e Mon Sep 17 00:00:00 2001 From: Carlos Polop Date: Wed, 1 Jan 2025 23:55:17 +0100 Subject: [PATCH] translate fix --- .github/pull_request_template.md | 1 - .gitignore | 1 - book.toml | 2 +- scripts/translator.py | 2 +- src/README.md | 1 - src/SUMMARY.md | 1 - .../azure-ad-connect-hybrid-identity/README.md | 1 - .../pta-pass-through-authentication.md | 1 - .../azure-ad-connect-hybrid-identity/seamless-sso.md | 1 - src/pentesting-cloud/azure-security/az-persistence/README.md | 1 - .../azure-security/az-persistence/az-queue-persistance.md | 1 - .../azure-security/az-persistence/az-storage-persistence.md | 1 - .../azure-security/az-persistence/az-vms-persistence.md | 1 - .../azure-security/az-post-exploitation/README.md | 1 - .../az-post-exploitation/az-blob-storage-post-exploitation.md | 1 - .../az-post-exploitation/az-file-share-post-exploitation.md | 1 - .../az-post-exploitation/az-function-apps-post-exploitation.md | 1 - .../az-post-exploitation/az-key-vault-post-exploitation.md | 1 - .../az-post-exploitation/az-queue-post-exploitation.md | 1 - .../az-post-exploitation/az-servicebus-post-exploitation.md | 1 - .../az-post-exploitation/az-sql-post-exploitation.md | 1 - .../az-post-exploitation/az-table-storage-post-exploitation.md | 1 - .../az-vms-and-network-post-exploitation.md | 1 - .../azure-security/az-privilege-escalation/README.md | 1 - .../az-privilege-escalation/az-app-services-privesc.md | 1 - .../az-privilege-escalation/az-authorization-privesc.md | 1 - .../az-privilege-escalation/az-entraid-privesc/README.md | 1 - .../az-conditional-access-policies-mfa-bypass.md | 1 - .../az-entraid-privesc/dynamic-groups.md | 1 - .../az-privilege-escalation/az-functions-app-privesc.md | 1 - .../az-privilege-escalation/az-key-vault-privesc.md | 1 - .../azure-security/az-privilege-escalation/az-queue-privesc.md | 1 - .../az-privilege-escalation/az-servicebus-privesc.md | 1 - .../azure-security/az-privilege-escalation/az-sql-privesc.md | 1 - .../az-privilege-escalation/az-storage-privesc.md | 1 - .../az-virtual-machines-and-network-privesc.md | 1 - src/pentesting-cloud/azure-security/az-services/README.md | 1 - src/pentesting-cloud/azure-security/az-services/az-acr.md | 1 - .../azure-security/az-services/az-app-service.md | 2 -- .../azure-security/az-services/az-application-proxy.md | 1 - .../azure-security/az-services/az-arm-templates.md | 1 - .../azure-security/az-services/az-automation-account/README.md | 1 - .../az-automation-account/az-state-configuration-rce.md | 1 - src/pentesting-cloud/azure-security/az-services/az-azuread.md | 1 - .../azure-security/az-services/az-file-shares.md | 1 - .../azure-security/az-services/az-function-apps.md | 1 - .../azure-security/az-services/az-logic-apps.md | 1 - .../az-management-groups-subscriptions-and-resource-groups.md | 1 - .../azure-security/az-services/az-queue-enum.md | 1 - .../azure-security/az-services/az-servicebus-enum.md | 1 - src/pentesting-cloud/azure-security/az-services/az-sql.md | 1 - src/pentesting-cloud/azure-security/az-services/az-storage.md | 1 - .../azure-security/az-services/az-table-storage.md | 1 - src/pentesting-cloud/azure-security/az-services/intune.md | 1 - src/pentesting-cloud/azure-security/az-services/keyvault.md | 1 - src/pentesting-cloud/azure-security/az-services/vms/README.md | 1 - .../azure-security/az-services/vms/az-azure-network.md | 1 - .../az-unauthenticated-enum-and-initial-entry/README.md | 1 - .../az-device-code-authentication-phishing.md | 1 - .../az-oauth-apps-phishing.md | 1 - .../az-password-spraying.md | 1 - .../az-unauthenticated-enum-and-initial-entry/az-vms-unath.md | 1 - src/pentesting-cloud/digital-ocean-pentesting/README.md | 1 - .../digital-ocean-pentesting/do-basic-information.md | 1 - .../digital-ocean-pentesting/do-permissions-for-a-pentest.md | 1 - .../digital-ocean-pentesting/do-services/README.md | 1 - .../digital-ocean-pentesting/do-services/do-apps.md | 1 - .../do-services/do-container-registry.md | 1 - .../digital-ocean-pentesting/do-services/do-databases.md | 1 - .../digital-ocean-pentesting/do-services/do-droplets.md | 1 - .../digital-ocean-pentesting/do-services/do-functions.md | 1 - .../digital-ocean-pentesting/do-services/do-images.md | 1 - .../digital-ocean-pentesting/do-services/do-kubernetes-doks.md | 1 - .../digital-ocean-pentesting/do-services/do-networking.md | 1 - .../digital-ocean-pentesting/do-services/do-projects.md | 1 - .../digital-ocean-pentesting/do-services/do-spaces.md | 1 - .../digital-ocean-pentesting/do-services/do-volumes.md | 1 - src/pentesting-cloud/gcp-security/README.md | 1 - .../gcp-security/gcp-basic-information/README.md | 1 - .../gcp-security/gcp-basic-information/gcp-federation-abuse.md | 1 - .../gcp-security/gcp-permissions-for-a-pentest.md | 1 - src/pentesting-cloud/gcp-security/gcp-persistence/README.md | 1 - .../gcp-security/gcp-persistence/gcp-api-keys-persistence.md | 1 - .../gcp-security/gcp-persistence/gcp-app-engine-persistence.md | 1 - .../gcp-persistence/gcp-artifact-registry-persistence.md | 1 - .../gcp-security/gcp-persistence/gcp-bigquery-persistence.md | 1 - .../gcp-persistence/gcp-cloud-functions-persistence.md | 1 - .../gcp-security/gcp-persistence/gcp-cloud-run-persistence.md | 1 - .../gcp-security/gcp-persistence/gcp-cloud-shell-persistence.md | 1 - .../gcp-security/gcp-persistence/gcp-cloud-sql-persistence.md | 1 - .../gcp-security/gcp-persistence/gcp-compute-persistence.md | 1 - .../gcp-security/gcp-persistence/gcp-dataflow-persistence.md | 1 - .../gcp-security/gcp-persistence/gcp-filestore-persistence.md | 1 - .../gcp-security/gcp-persistence/gcp-logging-persistence.md | 1 - .../gcp-security/gcp-persistence/gcp-non-svc-persistance.md | 1 - .../gcp-persistence/gcp-secret-manager-persistence.md | 1 - .../gcp-security/gcp-persistence/gcp-storage-persistence.md | 1 - .../gcp-security/gcp-post-exploitation/README.md | 1 - .../gcp-post-exploitation/gcp-app-engine-post-exploitation.md | 1 - .../gcp-artifact-registry-post-exploitation.md | 1 - .../gcp-post-exploitation/gcp-cloud-build-post-exploitation.md | 1 - .../gcp-cloud-functions-post-exploitation.md | 1 - .../gcp-post-exploitation/gcp-cloud-run-post-exploitation.md | 1 - .../gcp-post-exploitation/gcp-cloud-shell-post-exploitation.md | 1 - .../gcp-post-exploitation/gcp-cloud-sql-post-exploitation.md | 1 - .../gcp-post-exploitation/gcp-compute-post-exploitation.md | 1 - .../gcp-post-exploitation/gcp-filestore-post-exploitation.md | 1 - .../gcp-post-exploitation/gcp-iam-post-exploitation.md | 1 - .../gcp-post-exploitation/gcp-kms-post-exploitation.md | 1 - .../gcp-post-exploitation/gcp-logging-post-exploitation.md | 1 - .../gcp-post-exploitation/gcp-monitoring-post-exploitation.md | 1 - .../gcp-post-exploitation/gcp-pub-sub-post-exploitation.md | 1 - .../gcp-secretmanager-post-exploitation.md | 1 - .../gcp-post-exploitation/gcp-security-post-exploitation.md | 1 - .../gcp-post-exploitation/gcp-storage-post-exploitation.md | 1 - .../gcp-post-exploitation/gcp-workflows-post-exploitation.md | 1 - .../gcp-security/gcp-privilege-escalation/README.md | 1 - .../gcp-privilege-escalation/gcp-apikeys-privesc.md | 1 - .../gcp-privilege-escalation/gcp-appengine-privesc.md | 1 - .../gcp-privilege-escalation/gcp-artifact-registry-privesc.md | 1 - .../gcp-security/gcp-privilege-escalation/gcp-batch-privesc.md | 1 - .../gcp-privilege-escalation/gcp-bigquery-privesc.md | 1 - .../gcp-privilege-escalation/gcp-clientauthconfig-privesc.md | 1 - .../gcp-privilege-escalation/gcp-cloudbuild-privesc.md | 1 - .../gcp-privilege-escalation/gcp-cloudfunctions-privesc.md | 1 - .../gcp-privilege-escalation/gcp-cloudidentity-privesc.md | 1 - .../gcp-privilege-escalation/gcp-cloudscheduler-privesc.md | 1 - .../gcp-privilege-escalation/gcp-composer-privesc.md | 1 - .../gcp-privilege-escalation/gcp-compute-privesc/README.md | 1 - .../gcp-compute-privesc/gcp-add-custom-ssh-metadata.md | 1 - .../gcp-privilege-escalation/gcp-container-privesc.md | 1 - .../gcp-privilege-escalation/gcp-deploymentmaneger-privesc.md | 1 - .../gcp-security/gcp-privilege-escalation/gcp-iam-privesc.md | 1 - .../gcp-security/gcp-privilege-escalation/gcp-kms-privesc.md | 1 - .../gcp-local-privilege-escalation-ssh-pivoting.md | 1 - .../gcp-privilege-escalation/gcp-misc-perms-privesc.md | 1 - .../gcp-privilege-escalation/gcp-network-docker-escape.md | 1 - .../gcp-privilege-escalation/gcp-orgpolicy-privesc.md | 1 - .../gcp-security/gcp-privilege-escalation/gcp-pubsub-privesc.md | 1 - .../gcp-privilege-escalation/gcp-resourcemanager-privesc.md | 1 - .../gcp-security/gcp-privilege-escalation/gcp-run-privesc.md | 1 - .../gcp-privilege-escalation/gcp-secretmanager-privesc.md | 1 - .../gcp-privilege-escalation/gcp-serviceusage-privesc.md | 1 - .../gcp-privilege-escalation/gcp-sourcerepos-privesc.md | 1 - .../gcp-privilege-escalation/gcp-storage-privesc.md | 1 - .../gcp-privilege-escalation/gcp-workflows-privesc.md | 1 - src/pentesting-cloud/gcp-security/gcp-services/README.md | 1 - .../gcp-security/gcp-services/gcp-ai-platform-enum.md | 1 - .../gcp-security/gcp-services/gcp-api-keys-enum.md | 1 - .../gcp-security/gcp-services/gcp-app-engine-enum.md | 1 - .../gcp-security/gcp-services/gcp-artifact-registry-enum.md | 1 - .../gcp-security/gcp-services/gcp-batch-enum.md | 1 - .../gcp-security/gcp-services/gcp-bigquery-enum.md | 1 - .../gcp-security/gcp-services/gcp-bigtable-enum.md | 1 - .../gcp-security/gcp-services/gcp-cloud-build-enum.md | 1 - .../gcp-security/gcp-services/gcp-cloud-functions-enum.md | 1 - .../gcp-security/gcp-services/gcp-cloud-run-enum.md | 1 - .../gcp-security/gcp-services/gcp-cloud-scheduler-enum.md | 1 - .../gcp-security/gcp-services/gcp-cloud-shell-enum.md | 1 - .../gcp-security/gcp-services/gcp-cloud-sql-enum.md | 1 - .../gcp-security/gcp-services/gcp-composer-enum.md | 1 - .../gcp-services/gcp-compute-instances-enum/README.md | 1 - .../gcp-compute-instances-enum/gcp-compute-instance.md | 1 - .../gcp-compute-instances-enum/gcp-vpc-and-networking.md | 1 - .../gcp-services/gcp-containers-gke-and-composer-enum.md | 1 - src/pentesting-cloud/gcp-security/gcp-services/gcp-dns-enum.md | 1 - .../gcp-security/gcp-services/gcp-filestore-enum.md | 1 - .../gcp-security/gcp-services/gcp-firebase-enum.md | 1 - .../gcp-security/gcp-services/gcp-firestore-enum.md | 1 - .../gcp-security/gcp-services/gcp-iam-and-org-policies-enum.md | 1 - src/pentesting-cloud/gcp-security/gcp-services/gcp-kms-enum.md | 1 - .../gcp-security/gcp-services/gcp-logging-enum.md | 1 - .../gcp-security/gcp-services/gcp-memorystore-enum.md | 1 - .../gcp-security/gcp-services/gcp-monitoring-enum.md | 1 - src/pentesting-cloud/gcp-security/gcp-services/gcp-pub-sub.md | 1 - .../gcp-security/gcp-services/gcp-secrets-manager-enum.md | 1 - .../gcp-security/gcp-services/gcp-security-enum.md | 1 - .../gcp-security/gcp-services/gcp-source-repositories-enum.md | 1 - .../gcp-security/gcp-services/gcp-spanner-enum.md | 1 - .../gcp-security/gcp-services/gcp-stackdriver-enum.md | 1 - .../gcp-security/gcp-services/gcp-storage-enum.md | 1 - .../gcp-security/gcp-services/gcp-workflows-enum.md | 1 - .../gcp-security/gcp-to-workspace-pivoting/README.md | 1 - .../gcp-understanding-domain-wide-delegation.md | 1 - .../gcp-security/gcp-unauthenticated-enum-and-access/README.md | 1 - .../gcp-api-keys-unauthenticated-enum.md | 1 - .../gcp-app-engine-unauthenticated-enum.md | 1 - .../gcp-artifact-registry-unauthenticated-enum.md | 1 - .../gcp-cloud-build-unauthenticated-enum.md | 1 - .../gcp-cloud-functions-unauthenticated-enum.md | 1 - .../gcp-cloud-run-unauthenticated-enum.md | 1 - .../gcp-cloud-sql-unauthenticated-enum.md | 1 - .../gcp-compute-unauthenticated-enum.md | 1 - .../gcp-iam-principals-and-org-unauthenticated-enum.md | 1 - .../gcp-source-repositories-unauthenticated-enum.md | 1 - .../gcp-storage-unauthenticated-enum/README.md | 1 - .../gcp-public-buckets-privilege-escalation.md | 1 - src/pentesting-cloud/ibm-cloud-pentesting/README.md | 1 - .../ibm-cloud-pentesting/ibm-basic-information.md | 1 - .../ibm-cloud-pentesting/ibm-hyper-protect-crypto-services.md | 1 - .../ibm-cloud-pentesting/ibm-hyper-protect-virtual-server.md | 1 - src/pentesting-cloud/kubernetes-security/README.md | 1 - .../abusing-roles-clusterroles-in-kubernetes/README.md | 1 - .../kubernetes-roles-abuse-lab.md | 1 - .../pod-escape-privileges.md | 1 - .../attacking-kubernetes-from-inside-a-pod.md | 1 - .../kubernetes-security/exposing-services-in-kubernetes.md | 1 - src/pentesting-cloud/kubernetes-security/kubernetes-basics.md | 1 - .../kubernetes-security/kubernetes-enumeration.md | 1 - .../kubernetes-security/kubernetes-external-secrets-operator.md | 1 - .../kubernetes-security/kubernetes-hardening/README.md | 1 - .../kubernetes-hardening/kubernetes-securitycontext-s.md | 1 - .../kubernetes-security/kubernetes-kyverno/README.md | 1 - .../kubernetes-kyverno/kubernetes-kyverno-bypass.md | 1 - .../kubernetes-security/kubernetes-namespace-escalation.md | 1 - .../kubernetes-security/kubernetes-network-attacks.md | 1 - .../kubernetes-security/kubernetes-opa-gatekeeper/README.md | 1 - .../kubernetes-opa-gatekeeper-bypass.md | 1 - .../kubernetes-security/kubernetes-pivoting-to-clouds.md | 1 - .../kubernetes-role-based-access-control-rbac.md | 1 - .../kubernetes-validatingwebhookconfiguration.md | 1 - .../pentesting-kubernetes-services/README.md | 1 - .../kubelet-authentication-and-authorization.md | 1 - src/pentesting-cloud/openshift-pentesting/README.md | 1 - .../openshift-pentesting/openshift-basic-information.md | 1 - .../openshift-pentesting/openshift-jenkins/README.md | 1 - .../openshift-jenkins/openshift-jenkins-build-overrides.md | 1 - .../openshift-privilege-escalation/README.md | 1 - .../openshift-missing-service-account.md | 1 - .../openshift-privilege-escalation/openshift-scc-bypass.md | 1 - .../openshift-privilege-escalation/openshift-tekton.md | 1 - src/pentesting-cloud/openshift-pentesting/openshift-scc.md | 1 - src/pentesting-cloud/workspace-security/README.md | 1 - .../workspace-security/gws-google-platforms-phishing/README.md | 1 - .../gws-google-platforms-phishing/gws-app-scripts.md | 1 - src/pentesting-cloud/workspace-security/gws-persistence.md | 1 - .../workspace-security/gws-post-exploitation.md | 1 - .../README.md | 1 - .../gcds-google-cloud-directory-sync.md | 1 - .../gcpw-google-credential-provider-for-windows.md | 1 - .../gps-google-password-sync.md | 1 - .../gws-admin-directory-sync.md | 1 - 242 files changed, 2 insertions(+), 243 deletions(-) diff --git a/.github/pull_request_template.md b/.github/pull_request_template.md index 805261b27..5e04d31db 100644 --- a/.github/pull_request_template.md +++ b/.github/pull_request_template.md @@ -14,4 +14,3 @@ In any case, thanks for contributing to HackTricks! - diff --git a/.gitignore b/.gitignore index be68618dc..8d12fbb76 100644 --- a/.gitignore +++ b/.gitignore @@ -3,7 +3,6 @@ - # General .DS_Store .AppleDouble diff --git a/book.toml b/book.toml index 4add3bde9..e3330d5e6 100644 --- a/book.toml +++ b/book.toml @@ -1,5 +1,5 @@ [book] -authors = ["Carlos Polop"] +authors = ["HackTricks Team"] language = "en" multilingual = false src = "src" diff --git a/scripts/translator.py b/scripts/translator.py index d181ed731..480b50206 100644 --- a/scripts/translator.py +++ b/scripts/translator.py @@ -226,7 +226,7 @@ def copy_dirs(source_path, dest_path): print(f"Copied .gitbook folder from {source_folder} to {destination_folder}") def copy_files(source_path, dest_path): - file_names = ["src/SUMMARY.md", "hacktricks-preprocessonr.py", "book.toml", ".gitignore"] + file_names = ["src/SUMMARY.md", "hacktricks-preprocessor.py", "book.toml", ".gitignore"] for file_name in file_names: source_filepath = os.path.join(source_path, file_name) dest_filepath = os.path.join(dest_path, file_name) diff --git a/src/README.md b/src/README.md index 5e6cf51c1..01b146fd1 100644 --- a/src/README.md +++ b/src/README.md @@ -38,4 +38,3 @@ _Hacktricks logos & motion designed by_ [_@ppiernacho_](https://www.instagram.co - diff --git a/src/SUMMARY.md b/src/SUMMARY.md index 7e4cda7f1..feae5163c 100644 --- a/src/SUMMARY.md +++ b/src/SUMMARY.md @@ -505,4 +505,3 @@ - diff --git a/src/pentesting-cloud/azure-security/az-lateral-movement-cloud-on-prem/azure-ad-connect-hybrid-identity/README.md b/src/pentesting-cloud/azure-security/az-lateral-movement-cloud-on-prem/azure-ad-connect-hybrid-identity/README.md index ec734cb69..c9975bb1b 100644 --- a/src/pentesting-cloud/azure-security/az-lateral-movement-cloud-on-prem/azure-ad-connect-hybrid-identity/README.md +++ b/src/pentesting-cloud/azure-security/az-lateral-movement-cloud-on-prem/azure-ad-connect-hybrid-identity/README.md @@ -61,4 +61,3 @@ Get-ADSyncConnector - diff --git a/src/pentesting-cloud/azure-security/az-lateral-movement-cloud-on-prem/azure-ad-connect-hybrid-identity/pta-pass-through-authentication.md b/src/pentesting-cloud/azure-security/az-lateral-movement-cloud-on-prem/azure-ad-connect-hybrid-identity/pta-pass-through-authentication.md index f6edf1214..6baa54004 100644 --- a/src/pentesting-cloud/azure-security/az-lateral-movement-cloud-on-prem/azure-ad-connect-hybrid-identity/pta-pass-through-authentication.md +++ b/src/pentesting-cloud/azure-security/az-lateral-movement-cloud-on-prem/azure-ad-connect-hybrid-identity/pta-pass-through-authentication.md @@ -71,4 +71,3 @@ seamless-sso.md - diff --git a/src/pentesting-cloud/azure-security/az-lateral-movement-cloud-on-prem/azure-ad-connect-hybrid-identity/seamless-sso.md b/src/pentesting-cloud/azure-security/az-lateral-movement-cloud-on-prem/azure-ad-connect-hybrid-identity/seamless-sso.md index 289951b91..d475ac153 100644 --- a/src/pentesting-cloud/azure-security/az-lateral-movement-cloud-on-prem/azure-ad-connect-hybrid-identity/seamless-sso.md +++ b/src/pentesting-cloud/azure-security/az-lateral-movement-cloud-on-prem/azure-ad-connect-hybrid-identity/seamless-sso.md @@ -118,4 +118,3 @@ python rbdel.py -u \\ -p azureadssosvc$ - diff --git a/src/pentesting-cloud/azure-security/az-persistence/README.md b/src/pentesting-cloud/azure-security/az-persistence/README.md index e418fb5e6..7b616a6f9 100644 --- a/src/pentesting-cloud/azure-security/az-persistence/README.md +++ b/src/pentesting-cloud/azure-security/az-persistence/README.md @@ -69,4 +69,3 @@ Open-AADIntOffice365Portal -ImmutableID qIMPTm2Q3kimHgg4KQyveA== -Issuer "http:/ - diff --git a/src/pentesting-cloud/azure-security/az-persistence/az-queue-persistance.md b/src/pentesting-cloud/azure-security/az-persistence/az-queue-persistance.md index 7fda7614d..53f4bc63a 100644 --- a/src/pentesting-cloud/azure-security/az-persistence/az-queue-persistance.md +++ b/src/pentesting-cloud/azure-security/az-persistence/az-queue-persistance.md @@ -32,4 +32,3 @@ az storage queue policy set --name --permissions rwd --expiry 2024- - diff --git a/src/pentesting-cloud/azure-security/az-persistence/az-storage-persistence.md b/src/pentesting-cloud/azure-security/az-persistence/az-storage-persistence.md index 95dedb925..82fa727be 100644 --- a/src/pentesting-cloud/azure-security/az-persistence/az-storage-persistence.md +++ b/src/pentesting-cloud/azure-security/az-persistence/az-storage-persistence.md @@ -42,4 +42,3 @@ az storage blob service-properties delete-policy update \ - diff --git a/src/pentesting-cloud/azure-security/az-persistence/az-vms-persistence.md b/src/pentesting-cloud/azure-security/az-persistence/az-vms-persistence.md index 8d020a39e..cd1a0c3f3 100644 --- a/src/pentesting-cloud/azure-security/az-persistence/az-vms-persistence.md +++ b/src/pentesting-cloud/azure-security/az-persistence/az-vms-persistence.md @@ -26,4 +26,3 @@ An attacker could get access to the instances and backdoor them: - diff --git a/src/pentesting-cloud/azure-security/az-post-exploitation/README.md b/src/pentesting-cloud/azure-security/az-post-exploitation/README.md index 53b20671b..43798c4bf 100644 --- a/src/pentesting-cloud/azure-security/az-post-exploitation/README.md +++ b/src/pentesting-cloud/azure-security/az-post-exploitation/README.md @@ -3,4 +3,3 @@ - diff --git a/src/pentesting-cloud/azure-security/az-post-exploitation/az-blob-storage-post-exploitation.md b/src/pentesting-cloud/azure-security/az-post-exploitation/az-blob-storage-post-exploitation.md index 9c3d0b8c6..a3e0bd273 100644 --- a/src/pentesting-cloud/azure-security/az-post-exploitation/az-blob-storage-post-exploitation.md +++ b/src/pentesting-cloud/azure-security/az-post-exploitation/az-blob-storage-post-exploitation.md @@ -46,4 +46,3 @@ This would allow to delete objects inside the storage account which might **inte - diff --git a/src/pentesting-cloud/azure-security/az-post-exploitation/az-file-share-post-exploitation.md b/src/pentesting-cloud/azure-security/az-post-exploitation/az-file-share-post-exploitation.md index b3d3cf90f..8247980a1 100644 --- a/src/pentesting-cloud/azure-security/az-post-exploitation/az-file-share-post-exploitation.md +++ b/src/pentesting-cloud/azure-security/az-post-exploitation/az-file-share-post-exploitation.md @@ -49,4 +49,3 @@ This would allow to delete file inside the shared filesystem which might **inter - diff --git a/src/pentesting-cloud/azure-security/az-post-exploitation/az-function-apps-post-exploitation.md b/src/pentesting-cloud/azure-security/az-post-exploitation/az-function-apps-post-exploitation.md index e511ad994..363b385d2 100644 --- a/src/pentesting-cloud/azure-security/az-post-exploitation/az-function-apps-post-exploitation.md +++ b/src/pentesting-cloud/azure-security/az-post-exploitation/az-function-apps-post-exploitation.md @@ -18,4 +18,3 @@ For more information about function apps check: - diff --git a/src/pentesting-cloud/azure-security/az-post-exploitation/az-key-vault-post-exploitation.md b/src/pentesting-cloud/azure-security/az-post-exploitation/az-key-vault-post-exploitation.md index d9357b643..ae5cdf5e2 100644 --- a/src/pentesting-cloud/azure-security/az-post-exploitation/az-key-vault-post-exploitation.md +++ b/src/pentesting-cloud/azure-security/az-post-exploitation/az-key-vault-post-exploitation.md @@ -112,4 +112,3 @@ az keyvault secret restore --vault-name --file - diff --git a/src/pentesting-cloud/azure-security/az-post-exploitation/az-queue-post-exploitation.md b/src/pentesting-cloud/azure-security/az-post-exploitation/az-queue-post-exploitation.md index 03c59a8d5..c84d73899 100644 --- a/src/pentesting-cloud/azure-security/az-post-exploitation/az-queue-post-exploitation.md +++ b/src/pentesting-cloud/azure-security/az-post-exploitation/az-queue-post-exploitation.md @@ -90,4 +90,3 @@ az storage queue policy set --name --permissions rwd --expiry 2024- - diff --git a/src/pentesting-cloud/azure-security/az-post-exploitation/az-servicebus-post-exploitation.md b/src/pentesting-cloud/azure-security/az-post-exploitation/az-servicebus-post-exploitation.md index 2fdb2dc55..7dea64f6f 100644 --- a/src/pentesting-cloud/azure-security/az-post-exploitation/az-servicebus-post-exploitation.md +++ b/src/pentesting-cloud/azure-security/az-post-exploitation/az-servicebus-post-exploitation.md @@ -100,4 +100,3 @@ Take a look here: - diff --git a/src/pentesting-cloud/azure-security/az-post-exploitation/az-sql-post-exploitation.md b/src/pentesting-cloud/azure-security/az-post-exploitation/az-sql-post-exploitation.md index 7a8b1c1d5..96cf6c10c 100644 --- a/src/pentesting-cloud/azure-security/az-post-exploitation/az-sql-post-exploitation.md +++ b/src/pentesting-cloud/azure-security/az-post-exploitation/az-sql-post-exploitation.md @@ -103,4 +103,3 @@ az sql db import --admin-user \ - diff --git a/src/pentesting-cloud/azure-security/az-post-exploitation/az-table-storage-post-exploitation.md b/src/pentesting-cloud/azure-security/az-post-exploitation/az-table-storage-post-exploitation.md index 06e5df01e..15426e8b7 100644 --- a/src/pentesting-cloud/azure-security/az-post-exploitation/az-table-storage-post-exploitation.md +++ b/src/pentesting-cloud/azure-security/az-post-exploitation/az-table-storage-post-exploitation.md @@ -65,4 +65,3 @@ This would allow to delete file inside the shared filesystem which might **inter - diff --git a/src/pentesting-cloud/azure-security/az-post-exploitation/az-vms-and-network-post-exploitation.md b/src/pentesting-cloud/azure-security/az-post-exploitation/az-vms-and-network-post-exploitation.md index 900a5d9ce..33c242bf7 100644 --- a/src/pentesting-cloud/azure-security/az-post-exploitation/az-vms-and-network-post-exploitation.md +++ b/src/pentesting-cloud/azure-security/az-post-exploitation/az-vms-and-network-post-exploitation.md @@ -182,4 +182,3 @@ az vm application set \ - diff --git a/src/pentesting-cloud/azure-security/az-privilege-escalation/README.md b/src/pentesting-cloud/azure-security/az-privilege-escalation/README.md index 662469fc5..6e0dca199 100644 --- a/src/pentesting-cloud/azure-security/az-privilege-escalation/README.md +++ b/src/pentesting-cloud/azure-security/az-privilege-escalation/README.md @@ -3,4 +3,3 @@ - diff --git a/src/pentesting-cloud/azure-security/az-privilege-escalation/az-app-services-privesc.md b/src/pentesting-cloud/azure-security/az-privilege-escalation/az-app-services-privesc.md index 6a805ae88..5fd847020 100644 --- a/src/pentesting-cloud/azure-security/az-privilege-escalation/az-app-services-privesc.md +++ b/src/pentesting-cloud/azure-security/az-privilege-escalation/az-app-services-privesc.md @@ -40,4 +40,3 @@ ssh root@127.0.0.1 -p 39895 - diff --git a/src/pentesting-cloud/azure-security/az-privilege-escalation/az-authorization-privesc.md b/src/pentesting-cloud/azure-security/az-privilege-escalation/az-authorization-privesc.md index f8c4359f3..629cfa4fe 100644 --- a/src/pentesting-cloud/azure-security/az-privilege-escalation/az-authorization-privesc.md +++ b/src/pentesting-cloud/azure-security/az-privilege-escalation/az-authorization-privesc.md @@ -83,4 +83,3 @@ az rest --method PUT \ - diff --git a/src/pentesting-cloud/azure-security/az-privilege-escalation/az-entraid-privesc/README.md b/src/pentesting-cloud/azure-security/az-privilege-escalation/az-entraid-privesc/README.md index 940e80bce..211687ef1 100644 --- a/src/pentesting-cloud/azure-security/az-privilege-escalation/az-entraid-privesc/README.md +++ b/src/pentesting-cloud/azure-security/az-privilege-escalation/az-entraid-privesc/README.md @@ -358,4 +358,3 @@ az rest --method GET \ - diff --git a/src/pentesting-cloud/azure-security/az-privilege-escalation/az-entraid-privesc/az-conditional-access-policies-mfa-bypass.md b/src/pentesting-cloud/azure-security/az-privilege-escalation/az-entraid-privesc/az-conditional-access-policies-mfa-bypass.md index 27bf965d0..b1a1ff429 100644 --- a/src/pentesting-cloud/azure-security/az-privilege-escalation/az-entraid-privesc/az-conditional-access-policies-mfa-bypass.md +++ b/src/pentesting-cloud/azure-security/az-privilege-escalation/az-entraid-privesc/az-conditional-access-policies-mfa-bypass.md @@ -182,4 +182,3 @@ $data = Get-SharePointFilesFromGraph -authentication $token $data[0].downloadUrl - diff --git a/src/pentesting-cloud/azure-security/az-privilege-escalation/az-entraid-privesc/dynamic-groups.md b/src/pentesting-cloud/azure-security/az-privilege-escalation/az-entraid-privesc/dynamic-groups.md index 322d18348..caabdc640 100644 --- a/src/pentesting-cloud/azure-security/az-privilege-escalation/az-entraid-privesc/dynamic-groups.md +++ b/src/pentesting-cloud/azure-security/az-privilege-escalation/az-entraid-privesc/dynamic-groups.md @@ -51,4 +51,3 @@ az rest --method GET \ - diff --git a/src/pentesting-cloud/azure-security/az-privilege-escalation/az-functions-app-privesc.md b/src/pentesting-cloud/azure-security/az-privilege-escalation/az-functions-app-privesc.md index dd5b81f35..77d51464c 100644 --- a/src/pentesting-cloud/azure-security/az-privilege-escalation/az-functions-app-privesc.md +++ b/src/pentesting-cloud/azure-security/az-privilege-escalation/az-functions-app-privesc.md @@ -458,4 +458,3 @@ az functionapp deployment source config \ - diff --git a/src/pentesting-cloud/azure-security/az-privilege-escalation/az-key-vault-privesc.md b/src/pentesting-cloud/azure-security/az-privilege-escalation/az-key-vault-privesc.md index 2db843851..d76e7a61d 100644 --- a/src/pentesting-cloud/azure-security/az-privilege-escalation/az-key-vault-privesc.md +++ b/src/pentesting-cloud/azure-security/az-privilege-escalation/az-key-vault-privesc.md @@ -35,4 +35,3 @@ az keyvault set-policy \ - diff --git a/src/pentesting-cloud/azure-security/az-privilege-escalation/az-queue-privesc.md b/src/pentesting-cloud/azure-security/az-privilege-escalation/az-queue-privesc.md index db0b051cb..5adead1d1 100644 --- a/src/pentesting-cloud/azure-security/az-privilege-escalation/az-queue-privesc.md +++ b/src/pentesting-cloud/azure-security/az-privilege-escalation/az-queue-privesc.md @@ -74,4 +74,3 @@ az storage queue policy set --name --permissions rwd --expiry 2024- - diff --git a/src/pentesting-cloud/azure-security/az-privilege-escalation/az-servicebus-privesc.md b/src/pentesting-cloud/azure-security/az-privilege-escalation/az-servicebus-privesc.md index bee8aff28..2b66c2a81 100644 --- a/src/pentesting-cloud/azure-security/az-privilege-escalation/az-servicebus-privesc.md +++ b/src/pentesting-cloud/azure-security/az-privilege-escalation/az-servicebus-privesc.md @@ -155,4 +155,3 @@ az servicebus namespace authorization-rule update \ - diff --git a/src/pentesting-cloud/azure-security/az-privilege-escalation/az-sql-privesc.md b/src/pentesting-cloud/azure-security/az-privilege-escalation/az-sql-privesc.md index 76dbfdcfd..bd5747fd0 100644 --- a/src/pentesting-cloud/azure-security/az-privilege-escalation/az-sql-privesc.md +++ b/src/pentesting-cloud/azure-security/az-privilege-escalation/az-sql-privesc.md @@ -112,4 +112,3 @@ az sql server azure-ad-only-auth disable \ - diff --git a/src/pentesting-cloud/azure-security/az-privilege-escalation/az-storage-privesc.md b/src/pentesting-cloud/azure-security/az-privilege-escalation/az-storage-privesc.md index c2545f9e2..c09ae9f03 100644 --- a/src/pentesting-cloud/azure-security/az-privilege-escalation/az-storage-privesc.md +++ b/src/pentesting-cloud/azure-security/az-privilege-escalation/az-storage-privesc.md @@ -153,4 +153,3 @@ az storage share-rm restore \ - diff --git a/src/pentesting-cloud/azure-security/az-privilege-escalation/az-virtual-machines-and-network-privesc.md b/src/pentesting-cloud/azure-security/az-privilege-escalation/az-virtual-machines-and-network-privesc.md index 6d8ba6e74..3fe5cff1b 100644 --- a/src/pentesting-cloud/azure-security/az-privilege-escalation/az-virtual-machines-and-network-privesc.md +++ b/src/pentesting-cloud/azure-security/az-privilege-escalation/az-virtual-machines-and-network-privesc.md @@ -383,4 +383,3 @@ According to the [**docs**](https://learn.microsoft.com/en-us/azure/role-based-a - diff --git a/src/pentesting-cloud/azure-security/az-services/README.md b/src/pentesting-cloud/azure-security/az-services/README.md index 3a40a9dff..c1711f196 100644 --- a/src/pentesting-cloud/azure-security/az-services/README.md +++ b/src/pentesting-cloud/azure-security/az-services/README.md @@ -74,4 +74,3 @@ def main(req: func.HttpRequest) -> func.HttpResponse: - diff --git a/src/pentesting-cloud/azure-security/az-services/az-acr.md b/src/pentesting-cloud/azure-security/az-services/az-acr.md index 800b03b30..ec236c28e 100644 --- a/src/pentesting-cloud/azure-security/az-services/az-acr.md +++ b/src/pentesting-cloud/azure-security/az-services/az-acr.md @@ -53,4 +53,3 @@ docker pull .azurecr.io/: - diff --git a/src/pentesting-cloud/azure-security/az-services/az-app-service.md b/src/pentesting-cloud/azure-security/az-services/az-app-service.md index 7f7c34995..e578966f8 100644 --- a/src/pentesting-cloud/azure-security/az-services/az-app-service.md +++ b/src/pentesting-cloud/azure-security/az-services/az-app-service.md @@ -88,7 +88,6 @@ az webapp config storage-account list --name --resource-gl_group - # List all the functions az functionapp list @@ -213,4 +212,3 @@ git clone 'https://:@name.scm.azurewebsites.net/repo-name.gi - diff --git a/src/pentesting-cloud/azure-security/az-services/az-application-proxy.md b/src/pentesting-cloud/azure-security/az-services/az-application-proxy.md index e0cf6a053..e4c45fa42 100644 --- a/src/pentesting-cloud/azure-security/az-services/az-application-proxy.md +++ b/src/pentesting-cloud/azure-security/az-services/az-application-proxy.md @@ -41,4 +41,3 @@ Get-ApplicationProxyAssignedUsersAndGroups -ObjectId - diff --git a/src/pentesting-cloud/azure-security/az-services/az-arm-templates.md b/src/pentesting-cloud/azure-security/az-services/az-arm-templates.md index 6fcf24ecc..b587b9817 100644 --- a/src/pentesting-cloud/azure-security/az-services/az-arm-templates.md +++ b/src/pentesting-cloud/azure-security/az-services/az-arm-templates.md @@ -32,4 +32,3 @@ cat | Select-String password - diff --git a/src/pentesting-cloud/azure-security/az-services/az-automation-account/README.md b/src/pentesting-cloud/azure-security/az-services/az-automation-account/README.md index 43e03e664..ea3ca0066 100644 --- a/src/pentesting-cloud/azure-security/az-services/az-automation-account/README.md +++ b/src/pentesting-cloud/azure-security/az-services/az-automation-account/README.md @@ -179,4 +179,3 @@ $response = Invoke-WebRequest -Method Post -Uri $uri -Body $body - diff --git a/src/pentesting-cloud/azure-security/az-services/az-automation-account/az-state-configuration-rce.md b/src/pentesting-cloud/azure-security/az-services/az-automation-account/az-state-configuration-rce.md index a1c9b0e78..d98d02813 100644 --- a/src/pentesting-cloud/azure-security/az-services/az-automation-account/az-state-configuration-rce.md +++ b/src/pentesting-cloud/azure-security/az-services/az-automation-account/az-state-configuration-rce.md @@ -66,4 +66,3 @@ The successful execution of this process opens numerous possibilities for furthe - diff --git a/src/pentesting-cloud/azure-security/az-services/az-azuread.md b/src/pentesting-cloud/azure-security/az-services/az-azuread.md index 145e12b7b..6aa2bb2b0 100644 --- a/src/pentesting-cloud/azure-security/az-services/az-azuread.md +++ b/src/pentesting-cloud/azure-security/az-services/az-azuread.md @@ -1032,4 +1032,3 @@ The default mode is **Audit**: - diff --git a/src/pentesting-cloud/azure-security/az-services/az-file-shares.md b/src/pentesting-cloud/azure-security/az-services/az-file-shares.md index 92ec2c2d4..8fd7dc345 100644 --- a/src/pentesting-cloud/azure-security/az-services/az-file-shares.md +++ b/src/pentesting-cloud/azure-security/az-services/az-file-shares.md @@ -173,4 +173,3 @@ Same as storage persistence: - diff --git a/src/pentesting-cloud/azure-security/az-services/az-function-apps.md b/src/pentesting-cloud/azure-security/az-services/az-function-apps.md index 4d5ad8bba..fb15d42de 100644 --- a/src/pentesting-cloud/azure-security/az-services/az-function-apps.md +++ b/src/pentesting-cloud/azure-security/az-services/az-function-apps.md @@ -267,4 +267,3 @@ az rest --url "https://management.azure.com//resourceGroups/ -Name - diff --git a/src/pentesting-cloud/azure-security/az-services/az-management-groups-subscriptions-and-resource-groups.md b/src/pentesting-cloud/azure-security/az-services/az-management-groups-subscriptions-and-resource-groups.md index b6e7dc37c..634107e03 100644 --- a/src/pentesting-cloud/azure-security/az-services/az-management-groups-subscriptions-and-resource-groups.md +++ b/src/pentesting-cloud/azure-security/az-services/az-management-groups-subscriptions-and-resource-groups.md @@ -57,4 +57,3 @@ az group list --subscription "" --output table - diff --git a/src/pentesting-cloud/azure-security/az-services/az-queue-enum.md b/src/pentesting-cloud/azure-security/az-services/az-queue-enum.md index bd7e68a13..a66f6d38c 100644 --- a/src/pentesting-cloud/azure-security/az-services/az-queue-enum.md +++ b/src/pentesting-cloud/azure-security/az-services/az-queue-enum.md @@ -96,4 +96,3 @@ $queueMessage.Value - diff --git a/src/pentesting-cloud/azure-security/az-services/az-servicebus-enum.md b/src/pentesting-cloud/azure-security/az-services/az-servicebus-enum.md index 4e1d7d1f9..6e74cc914 100644 --- a/src/pentesting-cloud/azure-security/az-services/az-servicebus-enum.md +++ b/src/pentesting-cloud/azure-security/az-services/az-servicebus-enum.md @@ -101,4 +101,3 @@ az servicebus namespace authorization-rule keys list --resource-group .database.windows.net -U -P # List pools of DB - diff --git a/src/pentesting-cloud/digital-ocean-pentesting/do-services/do-droplets.md b/src/pentesting-cloud/digital-ocean-pentesting/do-services/do-droplets.md index 2b82e8236..42c7d2b14 100644 --- a/src/pentesting-cloud/digital-ocean-pentesting/do-services/do-droplets.md +++ b/src/pentesting-cloud/digital-ocean-pentesting/do-services/do-droplets.md @@ -82,4 +82,3 @@ It's also possible to launch a **recovery console** to run commands inside the h - diff --git a/src/pentesting-cloud/digital-ocean-pentesting/do-services/do-functions.md b/src/pentesting-cloud/digital-ocean-pentesting/do-services/do-functions.md index e0c7030d6..f3be0a004 100644 --- a/src/pentesting-cloud/digital-ocean-pentesting/do-services/do-functions.md +++ b/src/pentesting-cloud/digital-ocean-pentesting/do-services/do-functions.md @@ -61,4 +61,3 @@ doctl serverless activations result # get only the response resu - diff --git a/src/pentesting-cloud/digital-ocean-pentesting/do-services/do-images.md b/src/pentesting-cloud/digital-ocean-pentesting/do-services/do-images.md index 67b2ba40b..c1030be6c 100644 --- a/src/pentesting-cloud/digital-ocean-pentesting/do-services/do-images.md +++ b/src/pentesting-cloud/digital-ocean-pentesting/do-services/do-images.md @@ -20,4 +20,3 @@ doctl compute image list - diff --git a/src/pentesting-cloud/digital-ocean-pentesting/do-services/do-kubernetes-doks.md b/src/pentesting-cloud/digital-ocean-pentesting/do-services/do-kubernetes-doks.md index b838e21e3..20e54e0d3 100644 --- a/src/pentesting-cloud/digital-ocean-pentesting/do-services/do-kubernetes-doks.md +++ b/src/pentesting-cloud/digital-ocean-pentesting/do-services/do-kubernetes-doks.md @@ -40,4 +40,3 @@ doctl kubernetes cluster list-associated-resources - diff --git a/src/pentesting-cloud/digital-ocean-pentesting/do-services/do-networking.md b/src/pentesting-cloud/digital-ocean-pentesting/do-services/do-networking.md index f0e752871..f94ea62b2 100644 --- a/src/pentesting-cloud/digital-ocean-pentesting/do-services/do-networking.md +++ b/src/pentesting-cloud/digital-ocean-pentesting/do-services/do-networking.md @@ -46,4 +46,3 @@ doctl compute firewall remove-droplets --droplet-ids - diff --git a/src/pentesting-cloud/digital-ocean-pentesting/do-services/do-projects.md b/src/pentesting-cloud/digital-ocean-pentesting/do-services/do-projects.md index 3f8adcdc4..802d8af0e 100644 --- a/src/pentesting-cloud/digital-ocean-pentesting/do-services/do-projects.md +++ b/src/pentesting-cloud/digital-ocean-pentesting/do-services/do-projects.md @@ -24,4 +24,3 @@ doctl projects resources list # Get all the resources of a project - diff --git a/src/pentesting-cloud/digital-ocean-pentesting/do-services/do-spaces.md b/src/pentesting-cloud/digital-ocean-pentesting/do-services/do-spaces.md index faf452f36..73f621ec4 100644 --- a/src/pentesting-cloud/digital-ocean-pentesting/do-services/do-spaces.md +++ b/src/pentesting-cloud/digital-ocean-pentesting/do-services/do-spaces.md @@ -47,4 +47,3 @@ aws s3 ls --endpoint=https://fra1.digitaloceanspaces.com s3://uniqbucketname - diff --git a/src/pentesting-cloud/digital-ocean-pentesting/do-services/do-volumes.md b/src/pentesting-cloud/digital-ocean-pentesting/do-services/do-volumes.md index 34f57bb65..e761cead7 100644 --- a/src/pentesting-cloud/digital-ocean-pentesting/do-services/do-volumes.md +++ b/src/pentesting-cloud/digital-ocean-pentesting/do-services/do-volumes.md @@ -16,4 +16,3 @@ compute volume list - diff --git a/src/pentesting-cloud/gcp-security/README.md b/src/pentesting-cloud/gcp-security/README.md index 6ee2826c5..35d266403 100644 --- a/src/pentesting-cloud/gcp-security/README.md +++ b/src/pentesting-cloud/gcp-security/README.md @@ -246,4 +246,3 @@ gcloud config unset auth/access_token_file - diff --git a/src/pentesting-cloud/gcp-security/gcp-basic-information/README.md b/src/pentesting-cloud/gcp-security/gcp-basic-information/README.md index 28c82cfe4..c4ffd69b0 100644 --- a/src/pentesting-cloud/gcp-security/gcp-basic-information/README.md +++ b/src/pentesting-cloud/gcp-security/gcp-basic-information/README.md @@ -231,4 +231,3 @@ As defined by terraform in [https://registry.terraform.io/providers/hashicorp/go - diff --git a/src/pentesting-cloud/gcp-security/gcp-basic-information/gcp-federation-abuse.md b/src/pentesting-cloud/gcp-security/gcp-basic-information/gcp-federation-abuse.md index 7264de52e..5eeabadff 100644 --- a/src/pentesting-cloud/gcp-security/gcp-basic-information/gcp-federation-abuse.md +++ b/src/pentesting-cloud/gcp-security/gcp-basic-information/gcp-federation-abuse.md @@ -154,4 +154,3 @@ jobs: - diff --git a/src/pentesting-cloud/gcp-security/gcp-permissions-for-a-pentest.md b/src/pentesting-cloud/gcp-security/gcp-permissions-for-a-pentest.md index f80fca133..427f61f4b 100644 --- a/src/pentesting-cloud/gcp-security/gcp-permissions-for-a-pentest.md +++ b/src/pentesting-cloud/gcp-security/gcp-permissions-for-a-pentest.md @@ -145,4 +145,3 @@ roles/bigquery.metadataViewer - diff --git a/src/pentesting-cloud/gcp-security/gcp-persistence/README.md b/src/pentesting-cloud/gcp-security/gcp-persistence/README.md index 29e628792..e6fa4ba64 100644 --- a/src/pentesting-cloud/gcp-security/gcp-persistence/README.md +++ b/src/pentesting-cloud/gcp-security/gcp-persistence/README.md @@ -3,4 +3,3 @@ - diff --git a/src/pentesting-cloud/gcp-security/gcp-persistence/gcp-api-keys-persistence.md b/src/pentesting-cloud/gcp-security/gcp-persistence/gcp-api-keys-persistence.md index d763d87cb..7928c0ffb 100644 --- a/src/pentesting-cloud/gcp-security/gcp-persistence/gcp-api-keys-persistence.md +++ b/src/pentesting-cloud/gcp-security/gcp-persistence/gcp-api-keys-persistence.md @@ -22,4 +22,3 @@ Check how to do this in: - diff --git a/src/pentesting-cloud/gcp-security/gcp-persistence/gcp-app-engine-persistence.md b/src/pentesting-cloud/gcp-security/gcp-persistence/gcp-app-engine-persistence.md index 6d0ee2e1f..82c596004 100644 --- a/src/pentesting-cloud/gcp-security/gcp-persistence/gcp-app-engine-persistence.md +++ b/src/pentesting-cloud/gcp-security/gcp-persistence/gcp-app-engine-persistence.md @@ -22,4 +22,3 @@ If yoi could just modify the code of a running version or create a new one yo co - diff --git a/src/pentesting-cloud/gcp-security/gcp-persistence/gcp-artifact-registry-persistence.md b/src/pentesting-cloud/gcp-security/gcp-persistence/gcp-artifact-registry-persistence.md index 56d9bf760..592e3449d 100644 --- a/src/pentesting-cloud/gcp-security/gcp-persistence/gcp-artifact-registry-persistence.md +++ b/src/pentesting-cloud/gcp-security/gcp-persistence/gcp-artifact-registry-persistence.md @@ -43,4 +43,3 @@ https://book.hacktricks.xyz/pentesting-web/dependency-confusion - diff --git a/src/pentesting-cloud/gcp-security/gcp-persistence/gcp-bigquery-persistence.md b/src/pentesting-cloud/gcp-security/gcp-persistence/gcp-bigquery-persistence.md index 8d5d641e9..12783dc0f 100644 --- a/src/pentesting-cloud/gcp-security/gcp-persistence/gcp-bigquery-persistence.md +++ b/src/pentesting-cloud/gcp-security/gcp-persistence/gcp-bigquery-persistence.md @@ -22,4 +22,3 @@ Grant further access over datasets, tables, rows and columns to compromised user - diff --git a/src/pentesting-cloud/gcp-security/gcp-persistence/gcp-cloud-functions-persistence.md b/src/pentesting-cloud/gcp-security/gcp-persistence/gcp-cloud-functions-persistence.md index 25e82bdf1..cf0185c6c 100644 --- a/src/pentesting-cloud/gcp-security/gcp-persistence/gcp-cloud-functions-persistence.md +++ b/src/pentesting-cloud/gcp-security/gcp-persistence/gcp-cloud-functions-persistence.md @@ -20,4 +20,3 @@ For more info about Cloud Functions check: - diff --git a/src/pentesting-cloud/gcp-security/gcp-persistence/gcp-cloud-run-persistence.md b/src/pentesting-cloud/gcp-security/gcp-persistence/gcp-cloud-run-persistence.md index 144b68b8a..aad9707a7 100644 --- a/src/pentesting-cloud/gcp-security/gcp-persistence/gcp-cloud-run-persistence.md +++ b/src/pentesting-cloud/gcp-security/gcp-persistence/gcp-cloud-run-persistence.md @@ -26,4 +26,3 @@ Create a backdoored Service or Job - diff --git a/src/pentesting-cloud/gcp-security/gcp-persistence/gcp-cloud-shell-persistence.md b/src/pentesting-cloud/gcp-security/gcp-persistence/gcp-cloud-shell-persistence.md index 6484237a5..e3ebc5405 100644 --- a/src/pentesting-cloud/gcp-security/gcp-persistence/gcp-cloud-shell-persistence.md +++ b/src/pentesting-cloud/gcp-security/gcp-persistence/gcp-cloud-shell-persistence.md @@ -70,4 +70,3 @@ But you can find further information in [https://github.com/FrancescoDiSalesGith - diff --git a/src/pentesting-cloud/gcp-security/gcp-persistence/gcp-cloud-sql-persistence.md b/src/pentesting-cloud/gcp-security/gcp-persistence/gcp-cloud-sql-persistence.md index 1b26d09d9..d566e21f5 100644 --- a/src/pentesting-cloud/gcp-security/gcp-persistence/gcp-cloud-sql-persistence.md +++ b/src/pentesting-cloud/gcp-security/gcp-persistence/gcp-cloud-sql-persistence.md @@ -38,4 +38,3 @@ For more information check the technique in: - diff --git a/src/pentesting-cloud/gcp-security/gcp-persistence/gcp-compute-persistence.md b/src/pentesting-cloud/gcp-security/gcp-persistence/gcp-compute-persistence.md index ac3919ffa..afc78bd5b 100644 --- a/src/pentesting-cloud/gcp-security/gcp-persistence/gcp-compute-persistence.md +++ b/src/pentesting-cloud/gcp-security/gcp-persistence/gcp-compute-persistence.md @@ -20,4 +20,3 @@ For more informatoin about Compute and VPC (Networking) check: - diff --git a/src/pentesting-cloud/gcp-security/gcp-persistence/gcp-dataflow-persistence.md b/src/pentesting-cloud/gcp-security/gcp-persistence/gcp-dataflow-persistence.md index 58f285177..f26741493 100644 --- a/src/pentesting-cloud/gcp-security/gcp-persistence/gcp-dataflow-persistence.md +++ b/src/pentesting-cloud/gcp-security/gcp-persistence/gcp-dataflow-persistence.md @@ -54,4 +54,3 @@ gcloud dataflow $NAME_TEMPLATE run testing \ - diff --git a/src/pentesting-cloud/gcp-security/gcp-persistence/gcp-filestore-persistence.md b/src/pentesting-cloud/gcp-security/gcp-persistence/gcp-filestore-persistence.md index 0ef71caf8..b8b3416f2 100644 --- a/src/pentesting-cloud/gcp-security/gcp-persistence/gcp-filestore-persistence.md +++ b/src/pentesting-cloud/gcp-security/gcp-persistence/gcp-filestore-persistence.md @@ -22,4 +22,3 @@ gcp-filestore-persistence.md - diff --git a/src/pentesting-cloud/gcp-security/gcp-persistence/gcp-logging-persistence.md b/src/pentesting-cloud/gcp-security/gcp-persistence/gcp-logging-persistence.md index dfdec0c54..bb5a07bda 100644 --- a/src/pentesting-cloud/gcp-security/gcp-persistence/gcp-logging-persistence.md +++ b/src/pentesting-cloud/gcp-security/gcp-persistence/gcp-logging-persistence.md @@ -22,4 +22,3 @@ gcloud logging sinks create --log-filter="FILTER_CONDI - diff --git a/src/pentesting-cloud/gcp-security/gcp-persistence/gcp-non-svc-persistance.md b/src/pentesting-cloud/gcp-security/gcp-persistence/gcp-non-svc-persistance.md index 03f057015..c8e5c3e37 100644 --- a/src/pentesting-cloud/gcp-security/gcp-persistence/gcp-non-svc-persistance.md +++ b/src/pentesting-cloud/gcp-security/gcp-persistence/gcp-non-svc-persistance.md @@ -105,4 +105,3 @@ Some remediations for these techniques are explained in [https://www.netskope.co - diff --git a/src/pentesting-cloud/gcp-security/gcp-persistence/gcp-secret-manager-persistence.md b/src/pentesting-cloud/gcp-security/gcp-persistence/gcp-secret-manager-persistence.md index 260bd0f1d..681d320d2 100644 --- a/src/pentesting-cloud/gcp-security/gcp-persistence/gcp-secret-manager-persistence.md +++ b/src/pentesting-cloud/gcp-security/gcp-persistence/gcp-secret-manager-persistence.md @@ -23,4 +23,3 @@ An attacker could update the secret to: - diff --git a/src/pentesting-cloud/gcp-security/gcp-persistence/gcp-storage-persistence.md b/src/pentesting-cloud/gcp-security/gcp-persistence/gcp-storage-persistence.md index af1e5e00f..3cb7792e1 100644 --- a/src/pentesting-cloud/gcp-security/gcp-persistence/gcp-storage-persistence.md +++ b/src/pentesting-cloud/gcp-security/gcp-persistence/gcp-storage-persistence.md @@ -39,4 +39,3 @@ Another exploit script for this method can be found [here](https://github.com/Rh - diff --git a/src/pentesting-cloud/gcp-security/gcp-post-exploitation/README.md b/src/pentesting-cloud/gcp-security/gcp-post-exploitation/README.md index 059d4cbea..381b119b8 100644 --- a/src/pentesting-cloud/gcp-security/gcp-post-exploitation/README.md +++ b/src/pentesting-cloud/gcp-security/gcp-post-exploitation/README.md @@ -3,4 +3,3 @@ - diff --git a/src/pentesting-cloud/gcp-security/gcp-post-exploitation/gcp-app-engine-post-exploitation.md b/src/pentesting-cloud/gcp-security/gcp-post-exploitation/gcp-app-engine-post-exploitation.md index 94fbf3f8a..9290a1e6c 100644 --- a/src/pentesting-cloud/gcp-security/gcp-post-exploitation/gcp-app-engine-post-exploitation.md +++ b/src/pentesting-cloud/gcp-security/gcp-post-exploitation/gcp-app-engine-post-exploitation.md @@ -44,4 +44,3 @@ Modify source code to steal credentials if they are being sent or perform a defa - diff --git a/src/pentesting-cloud/gcp-security/gcp-post-exploitation/gcp-artifact-registry-post-exploitation.md b/src/pentesting-cloud/gcp-security/gcp-post-exploitation/gcp-artifact-registry-post-exploitation.md index 2ddce1d54..fce711b83 100644 --- a/src/pentesting-cloud/gcp-security/gcp-post-exploitation/gcp-artifact-registry-post-exploitation.md +++ b/src/pentesting-cloud/gcp-security/gcp-post-exploitation/gcp-artifact-registry-post-exploitation.md @@ -22,4 +22,3 @@ The Post Exploitation and Privesc techniques of Artifact Registry were mixed in: - diff --git a/src/pentesting-cloud/gcp-security/gcp-post-exploitation/gcp-cloud-build-post-exploitation.md b/src/pentesting-cloud/gcp-security/gcp-post-exploitation/gcp-cloud-build-post-exploitation.md index ba5350b4b..66aaaa149 100644 --- a/src/pentesting-cloud/gcp-security/gcp-post-exploitation/gcp-cloud-build-post-exploitation.md +++ b/src/pentesting-cloud/gcp-security/gcp-post-exploitation/gcp-cloud-build-post-exploitation.md @@ -30,4 +30,3 @@ curl -X POST \ - diff --git a/src/pentesting-cloud/gcp-security/gcp-post-exploitation/gcp-cloud-functions-post-exploitation.md b/src/pentesting-cloud/gcp-security/gcp-post-exploitation/gcp-cloud-functions-post-exploitation.md index 0fed88b0a..22e807679 100644 --- a/src/pentesting-cloud/gcp-security/gcp-post-exploitation/gcp-cloud-functions-post-exploitation.md +++ b/src/pentesting-cloud/gcp-security/gcp-post-exploitation/gcp-cloud-functions-post-exploitation.md @@ -128,4 +128,3 @@ def injection(): - diff --git a/src/pentesting-cloud/gcp-security/gcp-post-exploitation/gcp-cloud-run-post-exploitation.md b/src/pentesting-cloud/gcp-security/gcp-post-exploitation/gcp-cloud-run-post-exploitation.md index 9a1b57846..99cdea20d 100644 --- a/src/pentesting-cloud/gcp-security/gcp-post-exploitation/gcp-cloud-run-post-exploitation.md +++ b/src/pentesting-cloud/gcp-security/gcp-post-exploitation/gcp-cloud-run-post-exploitation.md @@ -24,4 +24,3 @@ Modify the run image to steal information and redeploy the new version (just upl - diff --git a/src/pentesting-cloud/gcp-security/gcp-post-exploitation/gcp-cloud-shell-post-exploitation.md b/src/pentesting-cloud/gcp-security/gcp-post-exploitation/gcp-cloud-shell-post-exploitation.md index b1ea7c2ce..4af812fdb 100644 --- a/src/pentesting-cloud/gcp-security/gcp-post-exploitation/gcp-cloud-shell-post-exploitation.md +++ b/src/pentesting-cloud/gcp-security/gcp-post-exploitation/gcp-cloud-shell-post-exploitation.md @@ -103,4 +103,3 @@ The instructions were copied from [https://github.com/FrancescoDiSalesGithub/Goo - diff --git a/src/pentesting-cloud/gcp-security/gcp-post-exploitation/gcp-cloud-sql-post-exploitation.md b/src/pentesting-cloud/gcp-security/gcp-post-exploitation/gcp-cloud-sql-post-exploitation.md index 33bfb12e4..4a8a470b3 100644 --- a/src/pentesting-cloud/gcp-security/gcp-post-exploitation/gcp-cloud-sql-post-exploitation.md +++ b/src/pentesting-cloud/gcp-security/gcp-post-exploitation/gcp-cloud-sql-post-exploitation.md @@ -104,4 +104,3 @@ gcloud sql databases delete --instance - diff --git a/src/pentesting-cloud/gcp-security/gcp-post-exploitation/gcp-compute-post-exploitation.md b/src/pentesting-cloud/gcp-security/gcp-post-exploitation/gcp-compute-post-exploitation.md index f6d39a8f0..b2759f47f 100644 --- a/src/pentesting-cloud/gcp-security/gcp-post-exploitation/gcp-compute-post-exploitation.md +++ b/src/pentesting-cloud/gcp-security/gcp-post-exploitation/gcp-compute-post-exploitation.md @@ -121,4 +121,3 @@ If you **cannot give access to a external project** to the snapshot or disk, you - diff --git a/src/pentesting-cloud/gcp-security/gcp-post-exploitation/gcp-filestore-post-exploitation.md b/src/pentesting-cloud/gcp-security/gcp-post-exploitation/gcp-filestore-post-exploitation.md index bd24bbb0e..5d3ea32ff 100644 --- a/src/pentesting-cloud/gcp-security/gcp-post-exploitation/gcp-filestore-post-exploitation.md +++ b/src/pentesting-cloud/gcp-security/gcp-post-exploitation/gcp-filestore-post-exploitation.md @@ -101,4 +101,3 @@ gcloud filestore backups create \ - diff --git a/src/pentesting-cloud/gcp-security/gcp-post-exploitation/gcp-iam-post-exploitation.md b/src/pentesting-cloud/gcp-security/gcp-post-exploitation/gcp-iam-post-exploitation.md index f7d393701..7ea202948 100644 --- a/src/pentesting-cloud/gcp-security/gcp-post-exploitation/gcp-iam-post-exploitation.md +++ b/src/pentesting-cloud/gcp-security/gcp-post-exploitation/gcp-iam-post-exploitation.md @@ -30,4 +30,3 @@ This is the **highest level you can assign using the gcloud tool**. - diff --git a/src/pentesting-cloud/gcp-security/gcp-post-exploitation/gcp-kms-post-exploitation.md b/src/pentesting-cloud/gcp-security/gcp-post-exploitation/gcp-kms-post-exploitation.md index 3dfd31284..0a624c559 100644 --- a/src/pentesting-cloud/gcp-security/gcp-post-exploitation/gcp-kms-post-exploitation.md +++ b/src/pentesting-cloud/gcp-security/gcp-post-exploitation/gcp-kms-post-exploitation.md @@ -258,4 +258,3 @@ print('Verified:', verified) - diff --git a/src/pentesting-cloud/gcp-security/gcp-post-exploitation/gcp-logging-post-exploitation.md b/src/pentesting-cloud/gcp-security/gcp-post-exploitation/gcp-logging-post-exploitation.md index c6bdd5376..dcf9c5c07 100644 --- a/src/pentesting-cloud/gcp-security/gcp-post-exploitation/gcp-logging-post-exploitation.md +++ b/src/pentesting-cloud/gcp-security/gcp-post-exploitation/gcp-logging-post-exploitation.md @@ -134,4 +134,3 @@ gcloud logging sinks update SINK_NAME --no-use-partitioned-tables - diff --git a/src/pentesting-cloud/gcp-security/gcp-post-exploitation/gcp-monitoring-post-exploitation.md b/src/pentesting-cloud/gcp-security/gcp-post-exploitation/gcp-monitoring-post-exploitation.md index 4d0227c77..405aacd9c 100644 --- a/src/pentesting-cloud/gcp-security/gcp-post-exploitation/gcp-monitoring-post-exploitation.md +++ b/src/pentesting-cloud/gcp-security/gcp-post-exploitation/gcp-monitoring-post-exploitation.md @@ -115,4 +115,3 @@ gcloud alpha monitoring channels update CHANNEL_ID --update-channel-labels=email - diff --git a/src/pentesting-cloud/gcp-security/gcp-post-exploitation/gcp-pub-sub-post-exploitation.md b/src/pentesting-cloud/gcp-security/gcp-post-exploitation/gcp-pub-sub-post-exploitation.md index 1d24f627e..15e58d3eb 100644 --- a/src/pentesting-cloud/gcp-security/gcp-post-exploitation/gcp-pub-sub-post-exploitation.md +++ b/src/pentesting-cloud/gcp-security/gcp-post-exploitation/gcp-pub-sub-post-exploitation.md @@ -141,4 +141,3 @@ gcloud pubsub subscriptions seek YOUR_SUBSCRIPTION_NAME \ - diff --git a/src/pentesting-cloud/gcp-security/gcp-post-exploitation/gcp-secretmanager-post-exploitation.md b/src/pentesting-cloud/gcp-security/gcp-post-exploitation/gcp-secretmanager-post-exploitation.md index a12db02ed..b1f356ee0 100644 --- a/src/pentesting-cloud/gcp-security/gcp-post-exploitation/gcp-secretmanager-post-exploitation.md +++ b/src/pentesting-cloud/gcp-security/gcp-post-exploitation/gcp-secretmanager-post-exploitation.md @@ -23,4 +23,3 @@ gcloud secrets versions access 1 --secret="" - diff --git a/src/pentesting-cloud/gcp-security/gcp-post-exploitation/gcp-security-post-exploitation.md b/src/pentesting-cloud/gcp-security/gcp-post-exploitation/gcp-security-post-exploitation.md index 92b0cee3e..e53661dec 100644 --- a/src/pentesting-cloud/gcp-security/gcp-post-exploitation/gcp-security-post-exploitation.md +++ b/src/pentesting-cloud/gcp-security/gcp-post-exploitation/gcp-security-post-exploitation.md @@ -59,4 +59,3 @@ gcloud scc findings update `myFinding` --organization=123456 --source=5678 --sta - diff --git a/src/pentesting-cloud/gcp-security/gcp-post-exploitation/gcp-storage-post-exploitation.md b/src/pentesting-cloud/gcp-security/gcp-post-exploitation/gcp-storage-post-exploitation.md index 3377adb88..7ce03d18d 100644 --- a/src/pentesting-cloud/gcp-security/gcp-post-exploitation/gcp-storage-post-exploitation.md +++ b/src/pentesting-cloud/gcp-security/gcp-post-exploitation/gcp-storage-post-exploitation.md @@ -35,4 +35,3 @@ To access open buckets via browser, access the URL `https://.storag - diff --git a/src/pentesting-cloud/gcp-security/gcp-post-exploitation/gcp-workflows-post-exploitation.md b/src/pentesting-cloud/gcp-security/gcp-post-exploitation/gcp-workflows-post-exploitation.md index be0e1a5c5..791d753a1 100644 --- a/src/pentesting-cloud/gcp-security/gcp-post-exploitation/gcp-workflows-post-exploitation.md +++ b/src/pentesting-cloud/gcp-security/gcp-post-exploitation/gcp-workflows-post-exploitation.md @@ -22,4 +22,3 @@ The post exploitation techniques are actually the same ones as the ones shared i - diff --git a/src/pentesting-cloud/gcp-security/gcp-privilege-escalation/README.md b/src/pentesting-cloud/gcp-security/gcp-privilege-escalation/README.md index 9da5e566e..a07d38d27 100644 --- a/src/pentesting-cloud/gcp-security/gcp-privilege-escalation/README.md +++ b/src/pentesting-cloud/gcp-security/gcp-privilege-escalation/README.md @@ -75,4 +75,3 @@ gcp-local-privilege-escalation-ssh-pivoting.md - diff --git a/src/pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-apikeys-privesc.md b/src/pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-apikeys-privesc.md index 600b14bdd..a207a58f9 100644 --- a/src/pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-apikeys-privesc.md +++ b/src/pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-apikeys-privesc.md @@ -79,4 +79,3 @@ Check the following page to learn how to do this, although this action belongs t - diff --git a/src/pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-appengine-privesc.md b/src/pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-appengine-privesc.md index ecf58d98f..976ae334c 100644 --- a/src/pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-appengine-privesc.md +++ b/src/pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-appengine-privesc.md @@ -113,4 +113,3 @@ It might be possible that performing a **Race Condition attack like with the buc - diff --git a/src/pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-artifact-registry-privesc.md b/src/pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-artifact-registry-privesc.md index 64222603a..8cefe1b3e 100644 --- a/src/pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-artifact-registry-privesc.md +++ b/src/pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-artifact-registry-privesc.md @@ -174,4 +174,3 @@ It might be possible that performing a **Race Condition attack like with the buc - diff --git a/src/pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-batch-privesc.md b/src/pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-batch-privesc.md index 34f4bdf00..f8a014b89 100644 --- a/src/pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-batch-privesc.md +++ b/src/pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-batch-privesc.md @@ -59,4 +59,3 @@ EOD - diff --git a/src/pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-bigquery-privesc.md b/src/pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-bigquery-privesc.md index aa5752bc9..9c8fe6672 100644 --- a/src/pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-bigquery-privesc.md +++ b/src/pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-bigquery-privesc.md @@ -117,4 +117,3 @@ bq query --nouse_legacy_sql 'DROP ALL ROW ACCESS POLICIES ON `. - diff --git a/src/pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-cloudscheduler-privesc.md b/src/pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-cloudscheduler-privesc.md index bea78fd35..8c250a3a0 100644 --- a/src/pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-cloudscheduler-privesc.md +++ b/src/pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-cloudscheduler-privesc.md @@ -118,4 +118,3 @@ gcloud auth activate-service-account --key-file=/tmp/lab.json - diff --git a/src/pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-composer-privesc.md b/src/pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-composer-privesc.md index 02733bcb0..6d0122318 100644 --- a/src/pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-composer-privesc.md +++ b/src/pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-composer-privesc.md @@ -126,4 +126,3 @@ TODO: Check what is possible to compromise by uploading data - diff --git a/src/pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-compute-privesc/README.md b/src/pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-compute-privesc/README.md index f76da5809..dc2155442 100644 --- a/src/pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-compute-privesc/README.md +++ b/src/pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-compute-privesc/README.md @@ -149,4 +149,3 @@ Following this link you find some [**ideas to try to bypass access scopes**](../ - diff --git a/src/pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-compute-privesc/gcp-add-custom-ssh-metadata.md b/src/pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-compute-privesc/gcp-add-custom-ssh-metadata.md index f74387441..381870b67 100644 --- a/src/pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-compute-privesc/gcp-add-custom-ssh-metadata.md +++ b/src/pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-compute-privesc/gcp-add-custom-ssh-metadata.md @@ -101,4 +101,3 @@ It's possible to broaden the reach of SSH access to multiple Virtual Machines (V - diff --git a/src/pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-container-privesc.md b/src/pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-container-privesc.md index ea10ba464..0c9542a41 100644 --- a/src/pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-container-privesc.md +++ b/src/pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-container-privesc.md @@ -92,4 +92,3 @@ For more information [**follow this link**](../../kubernetes-security/abusing-ro - diff --git a/src/pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-deploymentmaneger-privesc.md b/src/pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-deploymentmaneger-privesc.md index f77f14f62..2a770bff2 100644 --- a/src/pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-deploymentmaneger-privesc.md +++ b/src/pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-deploymentmaneger-privesc.md @@ -30,4 +30,3 @@ This is like the previous abuse but instead of directly creating a new deploymen - diff --git a/src/pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-iam-privesc.md b/src/pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-iam-privesc.md index 4ad8b082e..5ce6269b2 100644 --- a/src/pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-iam-privesc.md +++ b/src/pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-iam-privesc.md @@ -145,4 +145,3 @@ You can find an example on how to create and OpenID token behalf a service accou - diff --git a/src/pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-kms-privesc.md b/src/pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-kms-privesc.md index 1ca91fe11..155ac6ca3 100644 --- a/src/pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-kms-privesc.md +++ b/src/pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-kms-privesc.md @@ -89,4 +89,3 @@ Replace `[YOUR_PROJECT_ID]` and `[SERVICE_ACCOUNT_EMAIL]` with your project ID a - diff --git a/src/pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-local-privilege-escalation-ssh-pivoting.md b/src/pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-local-privilege-escalation-ssh-pivoting.md index 36ef69fea..baefccbf4 100644 --- a/src/pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-local-privilege-escalation-ssh-pivoting.md +++ b/src/pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-local-privilege-escalation-ssh-pivoting.md @@ -99,4 +99,3 @@ grep -Pzr '(?s)
' \ - diff --git a/src/pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-misc-perms-privesc.md b/src/pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-misc-perms-privesc.md index 2a4e5729a..02c451c62 100644 --- a/src/pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-misc-perms-privesc.md +++ b/src/pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-misc-perms-privesc.md @@ -26,4 +26,3 @@ This permission will usually let you **access or modify a Service Account in som - diff --git a/src/pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-network-docker-escape.md b/src/pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-network-docker-escape.md index b3d2e3034..ce142f914 100644 --- a/src/pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-network-docker-escape.md +++ b/src/pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-network-docker-escape.md @@ -57,4 +57,3 @@ This step authorizes the public key, enabling SSH connection with the correspond - diff --git a/src/pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-orgpolicy-privesc.md b/src/pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-orgpolicy-privesc.md index c025a23fe..21a8520fe 100644 --- a/src/pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-orgpolicy-privesc.md +++ b/src/pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-orgpolicy-privesc.md @@ -26,4 +26,3 @@ A python script for this method can be found [here](https://github.com/RhinoSecu - diff --git a/src/pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-pubsub-privesc.md b/src/pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-pubsub-privesc.md index 9daf0bde5..f993e1dfc 100644 --- a/src/pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-pubsub-privesc.md +++ b/src/pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-pubsub-privesc.md @@ -38,4 +38,3 @@ Give yourself any of the preiovus permissions - diff --git a/src/pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-resourcemanager-privesc.md b/src/pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-resourcemanager-privesc.md index b602b36dc..f54a24bbb 100644 --- a/src/pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-resourcemanager-privesc.md +++ b/src/pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-resourcemanager-privesc.md @@ -20,4 +20,3 @@ Like in the exploitation of `iam.serviceAccounts.setIamPolicy`, this permission - diff --git a/src/pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-run-privesc.md b/src/pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-run-privesc.md index d6318811c..1a7406400 100644 --- a/src/pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-run-privesc.md +++ b/src/pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-run-privesc.md @@ -90,4 +90,3 @@ gcloud beta run jobs execute job-name --region --update-env-vars="PYTHO - diff --git a/src/pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-secretmanager-privesc.md b/src/pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-secretmanager-privesc.md index e635e1265..c9e666b0f 100644 --- a/src/pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-secretmanager-privesc.md +++ b/src/pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-secretmanager-privesc.md @@ -39,4 +39,3 @@ gcloud secrets add-iam-policy-binding \ - diff --git a/src/pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-serviceusage-privesc.md b/src/pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-serviceusage-privesc.md index 934a814ed..55585de79 100644 --- a/src/pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-serviceusage-privesc.md +++ b/src/pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-serviceusage-privesc.md @@ -58,4 +58,3 @@ Get the [**official PEASS & HackTricks swag**](https://peass.creator-spring.com) - diff --git a/src/pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-sourcerepos-privesc.md b/src/pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-sourcerepos-privesc.md index ab9d4b2ae..c38bb92c4 100644 --- a/src/pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-sourcerepos-privesc.md +++ b/src/pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-sourcerepos-privesc.md @@ -88,4 +88,3 @@ gcloud source project-configs update --remove-topic=UPDATE_TOPIC - diff --git a/src/pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-storage-privesc.md b/src/pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-storage-privesc.md index 62ab9cb89..2a4301ea2 100644 --- a/src/pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-storage-privesc.md +++ b/src/pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-storage-privesc.md @@ -118,4 +118,3 @@ The mentioned attack can be performed in a lot of different ways, all of them st - diff --git a/src/pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-workflows-privesc.md b/src/pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-workflows-privesc.md index f4c25540e..ae0311897 100644 --- a/src/pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-workflows-privesc.md +++ b/src/pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-workflows-privesc.md @@ -108,4 +108,3 @@ With this permission instead of `workflows.workflows.create` it's possible to up - diff --git a/src/pentesting-cloud/gcp-security/gcp-services/README.md b/src/pentesting-cloud/gcp-security/gcp-services/README.md index 616e3f78c..d384117e2 100644 --- a/src/pentesting-cloud/gcp-security/gcp-services/README.md +++ b/src/pentesting-cloud/gcp-security/gcp-services/README.md @@ -3,4 +3,3 @@ - diff --git a/src/pentesting-cloud/gcp-security/gcp-services/gcp-ai-platform-enum.md b/src/pentesting-cloud/gcp-security/gcp-services/gcp-ai-platform-enum.md index fd5d80305..935c99654 100644 --- a/src/pentesting-cloud/gcp-security/gcp-services/gcp-ai-platform-enum.md +++ b/src/pentesting-cloud/gcp-security/gcp-services/gcp-ai-platform-enum.md @@ -23,4 +23,3 @@ gcloud ai-platform jobs describe - diff --git a/src/pentesting-cloud/gcp-security/gcp-services/gcp-api-keys-enum.md b/src/pentesting-cloud/gcp-security/gcp-services/gcp-api-keys-enum.md index 6d7e7a204..9bd8987c8 100644 --- a/src/pentesting-cloud/gcp-security/gcp-services/gcp-api-keys-enum.md +++ b/src/pentesting-cloud/gcp-security/gcp-services/gcp-api-keys-enum.md @@ -45,4 +45,3 @@ gcloud services api-keys list --show-deleted - diff --git a/src/pentesting-cloud/gcp-security/gcp-services/gcp-app-engine-enum.md b/src/pentesting-cloud/gcp-security/gcp-services/gcp-app-engine-enum.md index 03e6fde03..6ae359717 100644 --- a/src/pentesting-cloud/gcp-security/gcp-services/gcp-app-engine-enum.md +++ b/src/pentesting-cloud/gcp-security/gcp-services/gcp-app-engine-enum.md @@ -118,4 +118,3 @@ gcloud app ssl-certificates describe - diff --git a/src/pentesting-cloud/gcp-security/gcp-services/gcp-artifact-registry-enum.md b/src/pentesting-cloud/gcp-security/gcp-services/gcp-artifact-registry-enum.md index 4e9514b90..ce977184c 100644 --- a/src/pentesting-cloud/gcp-security/gcp-services/gcp-artifact-registry-enum.md +++ b/src/pentesting-cloud/gcp-security/gcp-services/gcp-artifact-registry-enum.md @@ -93,4 +93,3 @@ gcloud artifacts docker images list-vulnerabilities projects//locatio - diff --git a/src/pentesting-cloud/gcp-security/gcp-services/gcp-batch-enum.md b/src/pentesting-cloud/gcp-security/gcp-services/gcp-batch-enum.md index 1959d2a89..83c790dbb 100644 --- a/src/pentesting-cloud/gcp-security/gcp-services/gcp-batch-enum.md +++ b/src/pentesting-cloud/gcp-security/gcp-services/gcp-batch-enum.md @@ -36,4 +36,3 @@ gcloud batch tasks describe projects//locations//jobs/.INFORMATION_SCHEMA.SC - diff --git a/src/pentesting-cloud/gcp-security/gcp-services/gcp-bigtable-enum.md b/src/pentesting-cloud/gcp-security/gcp-services/gcp-bigtable-enum.md index 423437992..6a1085d07 100644 --- a/src/pentesting-cloud/gcp-security/gcp-services/gcp-bigtable-enum.md +++ b/src/pentesting-cloud/gcp-security/gcp-services/gcp-bigtable-enum.md @@ -33,4 +33,3 @@ gcloud bigtable app-profiles describe --instance - diff --git a/src/pentesting-cloud/gcp-security/gcp-services/gcp-cloud-build-enum.md b/src/pentesting-cloud/gcp-security/gcp-services/gcp-cloud-build-enum.md index de8d1650c..bfe28500b 100644 --- a/src/pentesting-cloud/gcp-security/gcp-services/gcp-cloud-build-enum.md +++ b/src/pentesting-cloud/gcp-security/gcp-services/gcp-cloud-build-enum.md @@ -172,4 +172,3 @@ done - diff --git a/src/pentesting-cloud/gcp-security/gcp-services/gcp-cloud-functions-enum.md b/src/pentesting-cloud/gcp-security/gcp-services/gcp-cloud-functions-enum.md index 36f87175d..4bd1872b4 100644 --- a/src/pentesting-cloud/gcp-security/gcp-services/gcp-cloud-functions-enum.md +++ b/src/pentesting-cloud/gcp-security/gcp-services/gcp-cloud-functions-enum.md @@ -109,4 +109,3 @@ In the following page, you can check how to **abuse cloud function permissions t - diff --git a/src/pentesting-cloud/gcp-security/gcp-services/gcp-cloud-run-enum.md b/src/pentesting-cloud/gcp-security/gcp-services/gcp-cloud-run-enum.md index 91e11a44c..12f9b8d55 100644 --- a/src/pentesting-cloud/gcp-security/gcp-services/gcp-cloud-run-enum.md +++ b/src/pentesting-cloud/gcp-security/gcp-services/gcp-cloud-run-enum.md @@ -112,4 +112,3 @@ In the following page, you can check how to **abuse cloud run permissions to esc - diff --git a/src/pentesting-cloud/gcp-security/gcp-services/gcp-cloud-scheduler-enum.md b/src/pentesting-cloud/gcp-security/gcp-services/gcp-cloud-scheduler-enum.md index d2fc063c8..18cc215bd 100644 --- a/src/pentesting-cloud/gcp-security/gcp-services/gcp-cloud-scheduler-enum.md +++ b/src/pentesting-cloud/gcp-security/gcp-services/gcp-cloud-scheduler-enum.md @@ -47,4 +47,3 @@ gcloud scheduler jobs describe --location us-central1 - diff --git a/src/pentesting-cloud/gcp-security/gcp-services/gcp-cloud-shell-enum.md b/src/pentesting-cloud/gcp-security/gcp-services/gcp-cloud-shell-enum.md index f6a7f6553..d3ac3441a 100644 --- a/src/pentesting-cloud/gcp-security/gcp-services/gcp-cloud-shell-enum.md +++ b/src/pentesting-cloud/gcp-security/gcp-services/gcp-cloud-shell-enum.md @@ -29,4 +29,3 @@ Note that Cloud Shell can be **easily disabled** for the organization. - diff --git a/src/pentesting-cloud/gcp-security/gcp-services/gcp-cloud-sql-enum.md b/src/pentesting-cloud/gcp-security/gcp-services/gcp-cloud-sql-enum.md index 421207574..d11e24a71 100644 --- a/src/pentesting-cloud/gcp-security/gcp-services/gcp-cloud-sql-enum.md +++ b/src/pentesting-cloud/gcp-security/gcp-services/gcp-cloud-sql-enum.md @@ -90,4 +90,3 @@ gcloud sql backups describe --instance - diff --git a/src/pentesting-cloud/gcp-security/gcp-services/gcp-composer-enum.md b/src/pentesting-cloud/gcp-security/gcp-services/gcp-composer-enum.md index a4e7edbcb..d0d44b757 100644 --- a/src/pentesting-cloud/gcp-security/gcp-services/gcp-composer-enum.md +++ b/src/pentesting-cloud/gcp-security/gcp-services/gcp-composer-enum.md @@ -44,4 +44,3 @@ In the following page you can check how to **abuse composer permissions to escal - diff --git a/src/pentesting-cloud/gcp-security/gcp-services/gcp-compute-instances-enum/README.md b/src/pentesting-cloud/gcp-security/gcp-services/gcp-compute-instances-enum/README.md index 0a943c01f..4bb461521 100644 --- a/src/pentesting-cloud/gcp-security/gcp-services/gcp-compute-instances-enum/README.md +++ b/src/pentesting-cloud/gcp-security/gcp-services/gcp-compute-instances-enum/README.md @@ -232,4 +232,3 @@ Check the Compute Instances privilege escalation section. - diff --git a/src/pentesting-cloud/gcp-security/gcp-services/gcp-compute-instances-enum/gcp-compute-instance.md b/src/pentesting-cloud/gcp-security/gcp-services/gcp-compute-instances-enum/gcp-compute-instance.md index 10c9af0cc..e02371007 100644 --- a/src/pentesting-cloud/gcp-security/gcp-services/gcp-compute-instances-enum/gcp-compute-instance.md +++ b/src/pentesting-cloud/gcp-security/gcp-services/gcp-compute-instances-enum/gcp-compute-instance.md @@ -104,4 +104,3 @@ A Google-managed encryption key is used by default a but a Customer-managed encr - diff --git a/src/pentesting-cloud/gcp-security/gcp-services/gcp-compute-instances-enum/gcp-vpc-and-networking.md b/src/pentesting-cloud/gcp-security/gcp-services/gcp-compute-instances-enum/gcp-vpc-and-networking.md index 8fe32acd3..436f72abc 100644 --- a/src/pentesting-cloud/gcp-security/gcp-services/gcp-compute-instances-enum/gcp-vpc-and-networking.md +++ b/src/pentesting-cloud/gcp-security/gcp-services/gcp-compute-instances-enum/gcp-vpc-and-networking.md @@ -86,4 +86,3 @@ These are the needed permissions: - diff --git a/src/pentesting-cloud/gcp-security/gcp-services/gcp-containers-gke-and-composer-enum.md b/src/pentesting-cloud/gcp-security/gcp-services/gcp-containers-gke-and-composer-enum.md index df3164830..a2fcc18a0 100644 --- a/src/pentesting-cloud/gcp-security/gcp-services/gcp-containers-gke-and-composer-enum.md +++ b/src/pentesting-cloud/gcp-security/gcp-services/gcp-containers-gke-and-composer-enum.md @@ -105,4 +105,3 @@ Even if the API **doesn't allow to modify resources**, it could be possible to f - diff --git a/src/pentesting-cloud/gcp-security/gcp-services/gcp-dns-enum.md b/src/pentesting-cloud/gcp-security/gcp-services/gcp-dns-enum.md index 5a178d0b3..8d88175c5 100644 --- a/src/pentesting-cloud/gcp-security/gcp-services/gcp-dns-enum.md +++ b/src/pentesting-cloud/gcp-security/gcp-services/gcp-dns-enum.md @@ -26,4 +26,3 @@ gcloud dns policies list - diff --git a/src/pentesting-cloud/gcp-security/gcp-services/gcp-filestore-enum.md b/src/pentesting-cloud/gcp-security/gcp-services/gcp-filestore-enum.md index 559326596..84333fc11 100644 --- a/src/pentesting-cloud/gcp-security/gcp-services/gcp-filestore-enum.md +++ b/src/pentesting-cloud/gcp-security/gcp-services/gcp-filestore-enum.md @@ -75,4 +75,3 @@ There aren't ways to escalate privileges in GCP directly abusing this service, b - diff --git a/src/pentesting-cloud/gcp-security/gcp-services/gcp-firebase-enum.md b/src/pentesting-cloud/gcp-security/gcp-services/gcp-firebase-enum.md index 3b7157d06..93c7a89a0 100644 --- a/src/pentesting-cloud/gcp-security/gcp-services/gcp-firebase-enum.md +++ b/src/pentesting-cloud/gcp-security/gcp-services/gcp-firebase-enum.md @@ -78,4 +78,3 @@ You may be able to access some interesting information - diff --git a/src/pentesting-cloud/gcp-security/gcp-services/gcp-firestore-enum.md b/src/pentesting-cloud/gcp-security/gcp-services/gcp-firestore-enum.md index 9b7d2b421..190873e1e 100644 --- a/src/pentesting-cloud/gcp-security/gcp-services/gcp-firestore-enum.md +++ b/src/pentesting-cloud/gcp-security/gcp-services/gcp-firestore-enum.md @@ -18,4 +18,3 @@ gcloud firestore export gs://my-source-project-export/export-20190113_2109 --col - diff --git a/src/pentesting-cloud/gcp-security/gcp-services/gcp-iam-and-org-policies-enum.md b/src/pentesting-cloud/gcp-security/gcp-services/gcp-iam-and-org-policies-enum.md index 789679201..847953cb8 100644 --- a/src/pentesting-cloud/gcp-security/gcp-services/gcp-iam-and-org-policies-enum.md +++ b/src/pentesting-cloud/gcp-security/gcp-services/gcp-iam-and-org-policies-enum.md @@ -227,4 +227,3 @@ In the following page you can check how to **abuse org policies permissions to e - diff --git a/src/pentesting-cloud/gcp-security/gcp-services/gcp-kms-enum.md b/src/pentesting-cloud/gcp-security/gcp-services/gcp-kms-enum.md index 4d42e1ef6..7e5bad13f 100644 --- a/src/pentesting-cloud/gcp-security/gcp-services/gcp-kms-enum.md +++ b/src/pentesting-cloud/gcp-security/gcp-services/gcp-kms-enum.md @@ -83,4 +83,3 @@ gcloud kms decrypt --ciphertext-file=[INFILE] \ - diff --git a/src/pentesting-cloud/gcp-security/gcp-services/gcp-logging-enum.md b/src/pentesting-cloud/gcp-security/gcp-services/gcp-logging-enum.md index 71acd1a6e..0b76ccb6d 100644 --- a/src/pentesting-cloud/gcp-security/gcp-services/gcp-logging-enum.md +++ b/src/pentesting-cloud/gcp-security/gcp-services/gcp-logging-enum.md @@ -147,4 +147,3 @@ There aren't logs of **`testIamPermissions`**: - diff --git a/src/pentesting-cloud/gcp-security/gcp-services/gcp-memorystore-enum.md b/src/pentesting-cloud/gcp-security/gcp-services/gcp-memorystore-enum.md index 3c1793f76..304d97744 100644 --- a/src/pentesting-cloud/gcp-security/gcp-services/gcp-memorystore-enum.md +++ b/src/pentesting-cloud/gcp-security/gcp-services/gcp-memorystore-enum.md @@ -22,4 +22,3 @@ gcloud redis instances export gs://my-bucket/my-redis-instance.rdb my-redis-inst - diff --git a/src/pentesting-cloud/gcp-security/gcp-services/gcp-monitoring-enum.md b/src/pentesting-cloud/gcp-security/gcp-services/gcp-monitoring-enum.md index 83f163400..2bb5dd4be 100644 --- a/src/pentesting-cloud/gcp-security/gcp-services/gcp-monitoring-enum.md +++ b/src/pentesting-cloud/gcp-security/gcp-services/gcp-monitoring-enum.md @@ -58,4 +58,3 @@ gcloud alpha monitoring channels describe - diff --git a/src/pentesting-cloud/gcp-security/gcp-services/gcp-pub-sub.md b/src/pentesting-cloud/gcp-security/gcp-services/gcp-pub-sub.md index fa73d5f0a..b10ff79c3 100644 --- a/src/pentesting-cloud/gcp-security/gcp-services/gcp-pub-sub.md +++ b/src/pentesting-cloud/gcp-security/gcp-services/gcp-pub-sub.md @@ -95,4 +95,3 @@ gcloud pubsub lite-operations describe - diff --git a/src/pentesting-cloud/gcp-security/gcp-services/gcp-secrets-manager-enum.md b/src/pentesting-cloud/gcp-security/gcp-services/gcp-secrets-manager-enum.md index f56c2fcb0..9d15ad819 100644 --- a/src/pentesting-cloud/gcp-security/gcp-services/gcp-secrets-manager-enum.md +++ b/src/pentesting-cloud/gcp-security/gcp-services/gcp-secrets-manager-enum.md @@ -54,4 +54,3 @@ An attacker could update the secret to **stop rotations** (so it won't be modifi - diff --git a/src/pentesting-cloud/gcp-security/gcp-services/gcp-security-enum.md b/src/pentesting-cloud/gcp-security/gcp-services/gcp-security-enum.md index b5aada876..f7db33fc1 100644 --- a/src/pentesting-cloud/gcp-security/gcp-services/gcp-security-enum.md +++ b/src/pentesting-cloud/gcp-security/gcp-services/gcp-security-enum.md @@ -93,4 +93,3 @@ gcp-secrets-manager-enum.md - diff --git a/src/pentesting-cloud/gcp-security/gcp-services/gcp-source-repositories-enum.md b/src/pentesting-cloud/gcp-security/gcp-services/gcp-source-repositories-enum.md index 330cf685b..e4038354e 100644 --- a/src/pentesting-cloud/gcp-security/gcp-services/gcp-source-repositories-enum.md +++ b/src/pentesting-cloud/gcp-security/gcp-services/gcp-source-repositories-enum.md @@ -68,4 +68,3 @@ git add, commit, push... - diff --git a/src/pentesting-cloud/gcp-security/gcp-services/gcp-spanner-enum.md b/src/pentesting-cloud/gcp-security/gcp-services/gcp-spanner-enum.md index 5c3d70ee5..afeed0ff1 100644 --- a/src/pentesting-cloud/gcp-security/gcp-services/gcp-spanner-enum.md +++ b/src/pentesting-cloud/gcp-security/gcp-services/gcp-spanner-enum.md @@ -32,4 +32,3 @@ gcloud spanner instance-configs describe - diff --git a/src/pentesting-cloud/gcp-security/gcp-services/gcp-stackdriver-enum.md b/src/pentesting-cloud/gcp-security/gcp-services/gcp-stackdriver-enum.md index 91c145171..7e3531157 100644 --- a/src/pentesting-cloud/gcp-security/gcp-services/gcp-stackdriver-enum.md +++ b/src/pentesting-cloud/gcp-security/gcp-services/gcp-stackdriver-enum.md @@ -34,4 +34,3 @@ gcloud logging buckets list - diff --git a/src/pentesting-cloud/gcp-security/gcp-services/gcp-storage-enum.md b/src/pentesting-cloud/gcp-security/gcp-services/gcp-storage-enum.md index e584d6448..b9e998390 100644 --- a/src/pentesting-cloud/gcp-security/gcp-services/gcp-storage-enum.md +++ b/src/pentesting-cloud/gcp-security/gcp-services/gcp-storage-enum.md @@ -157,4 +157,3 @@ In the following page you can check how to **abuse storage permissions to escala - diff --git a/src/pentesting-cloud/gcp-security/gcp-services/gcp-workflows-enum.md b/src/pentesting-cloud/gcp-security/gcp-services/gcp-workflows-enum.md index fc11f13dd..96cc99c7f 100644 --- a/src/pentesting-cloud/gcp-security/gcp-services/gcp-workflows-enum.md +++ b/src/pentesting-cloud/gcp-security/gcp-services/gcp-workflows-enum.md @@ -39,4 +39,3 @@ gcloud workflows executions describe projects//locations/ - diff --git a/src/pentesting-cloud/gcp-security/gcp-to-workspace-pivoting/README.md b/src/pentesting-cloud/gcp-security/gcp-to-workspace-pivoting/README.md index f70b027ee..4d562a1f5 100644 --- a/src/pentesting-cloud/gcp-security/gcp-to-workspace-pivoting/README.md +++ b/src/pentesting-cloud/gcp-security/gcp-to-workspace-pivoting/README.md @@ -172,4 +172,3 @@ Abusing the **google groups privesc** you might be able to escalate to a group w - diff --git a/src/pentesting-cloud/gcp-security/gcp-to-workspace-pivoting/gcp-understanding-domain-wide-delegation.md b/src/pentesting-cloud/gcp-security/gcp-to-workspace-pivoting/gcp-understanding-domain-wide-delegation.md index 19656923b..328d6b2df 100644 --- a/src/pentesting-cloud/gcp-security/gcp-to-workspace-pivoting/gcp-understanding-domain-wide-delegation.md +++ b/src/pentesting-cloud/gcp-security/gcp-to-workspace-pivoting/gcp-understanding-domain-wide-delegation.md @@ -29,4 +29,3 @@ This is how a GCP Service Account can access Google APIs on behalf of other iden - diff --git a/src/pentesting-cloud/gcp-security/gcp-unauthenticated-enum-and-access/README.md b/src/pentesting-cloud/gcp-security/gcp-unauthenticated-enum-and-access/README.md index 141e307cf..d5eb99285 100644 --- a/src/pentesting-cloud/gcp-security/gcp-unauthenticated-enum-and-access/README.md +++ b/src/pentesting-cloud/gcp-security/gcp-unauthenticated-enum-and-access/README.md @@ -19,4 +19,3 @@ Note that other cloud resources could be searched for and that some times these - diff --git a/src/pentesting-cloud/gcp-security/gcp-unauthenticated-enum-and-access/gcp-api-keys-unauthenticated-enum.md b/src/pentesting-cloud/gcp-security/gcp-unauthenticated-enum-and-access/gcp-api-keys-unauthenticated-enum.md index 8fe218ed7..76edb9531 100644 --- a/src/pentesting-cloud/gcp-security/gcp-unauthenticated-enum-and-access/gcp-api-keys-unauthenticated-enum.md +++ b/src/pentesting-cloud/gcp-security/gcp-unauthenticated-enum-and-access/gcp-api-keys-unauthenticated-enum.md @@ -53,4 +53,3 @@ As you might not know which APIs are enabled in the project, it would be interes - diff --git a/src/pentesting-cloud/gcp-security/gcp-unauthenticated-enum-and-access/gcp-app-engine-unauthenticated-enum.md b/src/pentesting-cloud/gcp-security/gcp-unauthenticated-enum-and-access/gcp-app-engine-unauthenticated-enum.md index 53211e47c..2a014e4d8 100644 --- a/src/pentesting-cloud/gcp-security/gcp-unauthenticated-enum-and-access/gcp-app-engine-unauthenticated-enum.md +++ b/src/pentesting-cloud/gcp-security/gcp-unauthenticated-enum-and-access/gcp-app-engine-unauthenticated-enum.md @@ -26,4 +26,3 @@ You could use tools like the ones indicated in: - diff --git a/src/pentesting-cloud/gcp-security/gcp-unauthenticated-enum-and-access/gcp-artifact-registry-unauthenticated-enum.md b/src/pentesting-cloud/gcp-security/gcp-unauthenticated-enum-and-access/gcp-artifact-registry-unauthenticated-enum.md index b2a9af31a..aa710f22a 100644 --- a/src/pentesting-cloud/gcp-security/gcp-unauthenticated-enum-and-access/gcp-artifact-registry-unauthenticated-enum.md +++ b/src/pentesting-cloud/gcp-security/gcp-unauthenticated-enum-and-access/gcp-artifact-registry-unauthenticated-enum.md @@ -22,4 +22,3 @@ Check the following page: - diff --git a/src/pentesting-cloud/gcp-security/gcp-unauthenticated-enum-and-access/gcp-cloud-build-unauthenticated-enum.md b/src/pentesting-cloud/gcp-security/gcp-unauthenticated-enum-and-access/gcp-cloud-build-unauthenticated-enum.md index 6bfa43ce0..2fd917ea7 100644 --- a/src/pentesting-cloud/gcp-security/gcp-unauthenticated-enum-and-access/gcp-cloud-build-unauthenticated-enum.md +++ b/src/pentesting-cloud/gcp-security/gcp-unauthenticated-enum-and-access/gcp-cloud-build-unauthenticated-enum.md @@ -43,4 +43,3 @@ Moreover, it's easy to see if some cloudbuild execution needs to be performed wh - diff --git a/src/pentesting-cloud/gcp-security/gcp-unauthenticated-enum-and-access/gcp-cloud-functions-unauthenticated-enum.md b/src/pentesting-cloud/gcp-security/gcp-unauthenticated-enum-and-access/gcp-cloud-functions-unauthenticated-enum.md index bb2e65cbb..bb77b9dd2 100644 --- a/src/pentesting-cloud/gcp-security/gcp-unauthenticated-enum-and-access/gcp-cloud-functions-unauthenticated-enum.md +++ b/src/pentesting-cloud/gcp-security/gcp-unauthenticated-enum-and-access/gcp-cloud-functions-unauthenticated-enum.md @@ -78,4 +78,3 @@ done - diff --git a/src/pentesting-cloud/gcp-security/gcp-unauthenticated-enum-and-access/gcp-cloud-run-unauthenticated-enum.md b/src/pentesting-cloud/gcp-security/gcp-unauthenticated-enum-and-access/gcp-cloud-run-unauthenticated-enum.md index 521412f9d..4607289d5 100644 --- a/src/pentesting-cloud/gcp-security/gcp-unauthenticated-enum-and-access/gcp-cloud-run-unauthenticated-enum.md +++ b/src/pentesting-cloud/gcp-security/gcp-unauthenticated-enum-and-access/gcp-cloud-run-unauthenticated-enum.md @@ -60,4 +60,3 @@ done - diff --git a/src/pentesting-cloud/gcp-security/gcp-unauthenticated-enum-and-access/gcp-cloud-sql-unauthenticated-enum.md b/src/pentesting-cloud/gcp-security/gcp-unauthenticated-enum-and-access/gcp-cloud-sql-unauthenticated-enum.md index fac47ccf9..6cd2f8bfc 100644 --- a/src/pentesting-cloud/gcp-security/gcp-unauthenticated-enum-and-access/gcp-cloud-sql-unauthenticated-enum.md +++ b/src/pentesting-cloud/gcp-security/gcp-unauthenticated-enum-and-access/gcp-cloud-sql-unauthenticated-enum.md @@ -26,4 +26,3 @@ Remember that with some privileges it's possible to **list all the database user - diff --git a/src/pentesting-cloud/gcp-security/gcp-unauthenticated-enum-and-access/gcp-compute-unauthenticated-enum.md b/src/pentesting-cloud/gcp-security/gcp-unauthenticated-enum-and-access/gcp-compute-unauthenticated-enum.md index 8e8abfa0e..a5fbc8503 100644 --- a/src/pentesting-cloud/gcp-security/gcp-unauthenticated-enum-and-access/gcp-compute-unauthenticated-enum.md +++ b/src/pentesting-cloud/gcp-security/gcp-unauthenticated-enum-and-access/gcp-compute-unauthenticated-enum.md @@ -26,4 +26,3 @@ If a GCP instance has a vulnerable exposed service an attacker could abuse it to - diff --git a/src/pentesting-cloud/gcp-security/gcp-unauthenticated-enum-and-access/gcp-iam-principals-and-org-unauthenticated-enum.md b/src/pentesting-cloud/gcp-security/gcp-unauthenticated-enum-and-access/gcp-iam-principals-and-org-unauthenticated-enum.md index 5dde2c77f..47330fb51 100644 --- a/src/pentesting-cloud/gcp-security/gcp-unauthenticated-enum-and-access/gcp-iam-principals-and-org-unauthenticated-enum.md +++ b/src/pentesting-cloud/gcp-security/gcp-unauthenticated-enum-and-access/gcp-iam-principals-and-org-unauthenticated-enum.md @@ -111,4 +111,3 @@ ERROR: (gcloud.projects.add-iam-policy-binding) INVALID_ARGUMENT: Principal test - diff --git a/src/pentesting-cloud/gcp-security/gcp-unauthenticated-enum-and-access/gcp-source-repositories-unauthenticated-enum.md b/src/pentesting-cloud/gcp-security/gcp-unauthenticated-enum-and-access/gcp-source-repositories-unauthenticated-enum.md index 3d831b51a..6f3daf339 100644 --- a/src/pentesting-cloud/gcp-security/gcp-unauthenticated-enum-and-access/gcp-source-repositories-unauthenticated-enum.md +++ b/src/pentesting-cloud/gcp-security/gcp-unauthenticated-enum-and-access/gcp-source-repositories-unauthenticated-enum.md @@ -21,4 +21,3 @@ If an external repository is being used via Source Repositories an attacker coul - diff --git a/src/pentesting-cloud/gcp-security/gcp-unauthenticated-enum-and-access/gcp-storage-unauthenticated-enum/README.md b/src/pentesting-cloud/gcp-security/gcp-unauthenticated-enum-and-access/gcp-storage-unauthenticated-enum/README.md index f6e17261a..be7050cbf 100644 --- a/src/pentesting-cloud/gcp-security/gcp-unauthenticated-enum-and-access/gcp-storage-unauthenticated-enum/README.md +++ b/src/pentesting-cloud/gcp-security/gcp-unauthenticated-enum-and-access/gcp-storage-unauthenticated-enum/README.md @@ -74,4 +74,3 @@ done - diff --git a/src/pentesting-cloud/gcp-security/gcp-unauthenticated-enum-and-access/gcp-storage-unauthenticated-enum/gcp-public-buckets-privilege-escalation.md b/src/pentesting-cloud/gcp-security/gcp-unauthenticated-enum-and-access/gcp-storage-unauthenticated-enum/gcp-public-buckets-privilege-escalation.md index f6cf4c708..1ca038b61 100644 --- a/src/pentesting-cloud/gcp-security/gcp-unauthenticated-enum-and-access/gcp-storage-unauthenticated-enum/gcp-public-buckets-privilege-escalation.md +++ b/src/pentesting-cloud/gcp-security/gcp-unauthenticated-enum-and-access/gcp-storage-unauthenticated-enum/gcp-public-buckets-privilege-escalation.md @@ -32,4 +32,3 @@ Another attack would be to **remove the bucket an d recreate it in your account - diff --git a/src/pentesting-cloud/ibm-cloud-pentesting/README.md b/src/pentesting-cloud/ibm-cloud-pentesting/README.md index 93a9a05c3..cdfb9d688 100644 --- a/src/pentesting-cloud/ibm-cloud-pentesting/README.md +++ b/src/pentesting-cloud/ibm-cloud-pentesting/README.md @@ -39,4 +39,3 @@ https://book.hacktricks.xyz/pentesting-web/ssrf-server-side-request-forgery/clou - diff --git a/src/pentesting-cloud/ibm-cloud-pentesting/ibm-basic-information.md b/src/pentesting-cloud/ibm-cloud-pentesting/ibm-basic-information.md index a11fbec57..dffe8f7e2 100644 --- a/src/pentesting-cloud/ibm-cloud-pentesting/ibm-basic-information.md +++ b/src/pentesting-cloud/ibm-cloud-pentesting/ibm-basic-information.md @@ -73,4 +73,3 @@ When creating the policy you need to choose: - diff --git a/src/pentesting-cloud/ibm-cloud-pentesting/ibm-hyper-protect-crypto-services.md b/src/pentesting-cloud/ibm-cloud-pentesting/ibm-hyper-protect-crypto-services.md index f0d1a605a..8f7ce08fd 100644 --- a/src/pentesting-cloud/ibm-cloud-pentesting/ibm-hyper-protect-crypto-services.md +++ b/src/pentesting-cloud/ibm-cloud-pentesting/ibm-hyper-protect-crypto-services.md @@ -30,4 +30,3 @@ Overall, the high level of security provided by HSMs makes it **very difficult t - diff --git a/src/pentesting-cloud/ibm-cloud-pentesting/ibm-hyper-protect-virtual-server.md b/src/pentesting-cloud/ibm-cloud-pentesting/ibm-hyper-protect-virtual-server.md index eb99bff8f..094e30b7b 100644 --- a/src/pentesting-cloud/ibm-cloud-pentesting/ibm-hyper-protect-virtual-server.md +++ b/src/pentesting-cloud/ibm-cloud-pentesting/ibm-hyper-protect-virtual-server.md @@ -43,4 +43,3 @@ Overall, LinuxONE is a powerful and secure platform that is well-suited for runn - diff --git a/src/pentesting-cloud/kubernetes-security/README.md b/src/pentesting-cloud/kubernetes-security/README.md index 4f7e16ef0..025bd2516 100644 --- a/src/pentesting-cloud/kubernetes-security/README.md +++ b/src/pentesting-cloud/kubernetes-security/README.md @@ -81,4 +81,3 @@ kubernetes-pivoting-to-clouds.md - diff --git a/src/pentesting-cloud/kubernetes-security/abusing-roles-clusterroles-in-kubernetes/README.md b/src/pentesting-cloud/kubernetes-security/abusing-roles-clusterroles-in-kubernetes/README.md index 67ebbd554..8b56153c6 100644 --- a/src/pentesting-cloud/kubernetes-security/abusing-roles-clusterroles-in-kubernetes/README.md +++ b/src/pentesting-cloud/kubernetes-security/abusing-roles-clusterroles-in-kubernetes/README.md @@ -699,4 +699,3 @@ https://github.com/aquasecurity/kube-bench - diff --git a/src/pentesting-cloud/kubernetes-security/abusing-roles-clusterroles-in-kubernetes/kubernetes-roles-abuse-lab.md b/src/pentesting-cloud/kubernetes-security/abusing-roles-clusterroles-in-kubernetes/kubernetes-roles-abuse-lab.md index 0524213fb..6d1526baa 100644 --- a/src/pentesting-cloud/kubernetes-security/abusing-roles-clusterroles-in-kubernetes/kubernetes-roles-abuse-lab.md +++ b/src/pentesting-cloud/kubernetes-security/abusing-roles-clusterroles-in-kubernetes/kubernetes-roles-abuse-lab.md @@ -613,4 +613,3 @@ kubectl delete serviceaccount test-sa - diff --git a/src/pentesting-cloud/kubernetes-security/abusing-roles-clusterroles-in-kubernetes/pod-escape-privileges.md b/src/pentesting-cloud/kubernetes-security/abusing-roles-clusterroles-in-kubernetes/pod-escape-privileges.md index 606d7a287..1c36fbb33 100644 --- a/src/pentesting-cloud/kubernetes-security/abusing-roles-clusterroles-in-kubernetes/pod-escape-privileges.md +++ b/src/pentesting-cloud/kubernetes-security/abusing-roles-clusterroles-in-kubernetes/pod-escape-privileges.md @@ -50,4 +50,3 @@ spec: - diff --git a/src/pentesting-cloud/kubernetes-security/attacking-kubernetes-from-inside-a-pod.md b/src/pentesting-cloud/kubernetes-security/attacking-kubernetes-from-inside-a-pod.md index 4a0a3ebc0..8f7a8c6c5 100644 --- a/src/pentesting-cloud/kubernetes-security/attacking-kubernetes-from-inside-a-pod.md +++ b/src/pentesting-cloud/kubernetes-security/attacking-kubernetes-from-inside-a-pod.md @@ -396,4 +396,3 @@ Off-Menu + - diff --git a/src/pentesting-cloud/kubernetes-security/exposing-services-in-kubernetes.md b/src/pentesting-cloud/kubernetes-security/exposing-services-in-kubernetes.md index cc1a49ce0..b3a864f17 100644 --- a/src/pentesting-cloud/kubernetes-security/exposing-services-in-kubernetes.md +++ b/src/pentesting-cloud/kubernetes-security/exposing-services-in-kubernetes.md @@ -216,4 +216,3 @@ kubectl get ingresses --all-namespaces -o=yaml - diff --git a/src/pentesting-cloud/kubernetes-security/kubernetes-basics.md b/src/pentesting-cloud/kubernetes-security/kubernetes-basics.md index f4e4ed9e0..28852b59f 100644 --- a/src/pentesting-cloud/kubernetes-security/kubernetes-basics.md +++ b/src/pentesting-cloud/kubernetes-security/kubernetes-basics.md @@ -570,4 +570,3 @@ https://www.youtube.com/watch?v=X48VuDVv0do - diff --git a/src/pentesting-cloud/kubernetes-security/kubernetes-enumeration.md b/src/pentesting-cloud/kubernetes-security/kubernetes-enumeration.md index 9978c527c..af9bc743f 100644 --- a/src/pentesting-cloud/kubernetes-security/kubernetes-enumeration.md +++ b/src/pentesting-cloud/kubernetes-security/kubernetes-enumeration.md @@ -613,4 +613,3 @@ https://www.cyberark.com/resources/threat-research-blog/kubernetes-pentest-metho - diff --git a/src/pentesting-cloud/kubernetes-security/kubernetes-external-secrets-operator.md b/src/pentesting-cloud/kubernetes-security/kubernetes-external-secrets-operator.md index 6f0db6d77..7b8b8a438 100644 --- a/src/pentesting-cloud/kubernetes-security/kubernetes-external-secrets-operator.md +++ b/src/pentesting-cloud/kubernetes-security/kubernetes-external-secrets-operator.md @@ -119,4 +119,3 @@ https://github.com/external-secrets/external-secrets - diff --git a/src/pentesting-cloud/kubernetes-security/kubernetes-hardening/README.md b/src/pentesting-cloud/kubernetes-security/kubernetes-hardening/README.md index 0e7e19ca4..1bb763d37 100644 --- a/src/pentesting-cloud/kubernetes-security/kubernetes-hardening/README.md +++ b/src/pentesting-cloud/kubernetes-security/kubernetes-hardening/README.md @@ -175,4 +175,3 @@ You should update your Kubernetes environment as frequently as necessary to have - diff --git a/src/pentesting-cloud/kubernetes-security/kubernetes-hardening/kubernetes-securitycontext-s.md b/src/pentesting-cloud/kubernetes-security/kubernetes-hardening/kubernetes-securitycontext-s.md index 7d6ac6206..b9e974594 100644 --- a/src/pentesting-cloud/kubernetes-security/kubernetes-hardening/kubernetes-securitycontext-s.md +++ b/src/pentesting-cloud/kubernetes-security/kubernetes-hardening/kubernetes-securitycontext-s.md @@ -63,4 +63,3 @@ Note that the attributes set in **both SecurityContext and PodSecurityContext**, - diff --git a/src/pentesting-cloud/kubernetes-security/kubernetes-kyverno/README.md b/src/pentesting-cloud/kubernetes-security/kubernetes-kyverno/README.md index 188e55680..5195017ed 100644 --- a/src/pentesting-cloud/kubernetes-security/kubernetes-kyverno/README.md +++ b/src/pentesting-cloud/kubernetes-security/kubernetes-kyverno/README.md @@ -57,4 +57,3 @@ When a pod is created in the `default` namespace without the label `app: myapp`, - diff --git a/src/pentesting-cloud/kubernetes-security/kubernetes-kyverno/kubernetes-kyverno-bypass.md b/src/pentesting-cloud/kubernetes-security/kubernetes-kyverno/kubernetes-kyverno-bypass.md index db10b992a..5058fe17c 100644 --- a/src/pentesting-cloud/kubernetes-security/kubernetes-kyverno/kubernetes-kyverno-bypass.md +++ b/src/pentesting-cloud/kubernetes-security/kubernetes-kyverno/kubernetes-kyverno-bypass.md @@ -61,4 +61,3 @@ Another way to bypass policies is to focus on the ValidatingWebhookConfiguration - diff --git a/src/pentesting-cloud/kubernetes-security/kubernetes-namespace-escalation.md b/src/pentesting-cloud/kubernetes-security/kubernetes-namespace-escalation.md index a32a97b19..f63098e62 100644 --- a/src/pentesting-cloud/kubernetes-security/kubernetes-namespace-escalation.md +++ b/src/pentesting-cloud/kubernetes-security/kubernetes-namespace-escalation.md @@ -34,4 +34,3 @@ attacking-kubernetes-from-inside-a-pod.md - diff --git a/src/pentesting-cloud/kubernetes-security/kubernetes-network-attacks.md b/src/pentesting-cloud/kubernetes-security/kubernetes-network-attacks.md index 0972fcc04..e8b7e1ce0 100644 --- a/src/pentesting-cloud/kubernetes-security/kubernetes-network-attacks.md +++ b/src/pentesting-cloud/kubernetes-security/kubernetes-network-attacks.md @@ -291,4 +291,3 @@ It will install agents in the selected pods and gather their traffic information - diff --git a/src/pentesting-cloud/kubernetes-security/kubernetes-opa-gatekeeper/README.md b/src/pentesting-cloud/kubernetes-security/kubernetes-opa-gatekeeper/README.md index 5d883761a..476a4aed2 100644 --- a/src/pentesting-cloud/kubernetes-security/kubernetes-opa-gatekeeper/README.md +++ b/src/pentesting-cloud/kubernetes-security/kubernetes-opa-gatekeeper/README.md @@ -77,4 +77,3 @@ When Gatekeeper is deployed in the Kubernetes cluster, it will enforce this poli - diff --git a/src/pentesting-cloud/kubernetes-security/kubernetes-opa-gatekeeper/kubernetes-opa-gatekeeper-bypass.md b/src/pentesting-cloud/kubernetes-security/kubernetes-opa-gatekeeper/kubernetes-opa-gatekeeper-bypass.md index c821fd89c..be963facb 100644 --- a/src/pentesting-cloud/kubernetes-security/kubernetes-opa-gatekeeper/kubernetes-opa-gatekeeper-bypass.md +++ b/src/pentesting-cloud/kubernetes-security/kubernetes-opa-gatekeeper/kubernetes-opa-gatekeeper-bypass.md @@ -64,4 +64,3 @@ Another way to bypass constraints is to focus on the ValidatingWebhookConfigurat - diff --git a/src/pentesting-cloud/kubernetes-security/kubernetes-pivoting-to-clouds.md b/src/pentesting-cloud/kubernetes-security/kubernetes-pivoting-to-clouds.md index cf64bca6c..7a28d5ef9 100644 --- a/src/pentesting-cloud/kubernetes-security/kubernetes-pivoting-to-clouds.md +++ b/src/pentesting-cloud/kubernetes-security/kubernetes-pivoting-to-clouds.md @@ -324,4 +324,3 @@ fi - diff --git a/src/pentesting-cloud/kubernetes-security/kubernetes-role-based-access-control-rbac.md b/src/pentesting-cloud/kubernetes-security/kubernetes-role-based-access-control-rbac.md index 3ef90b8f5..98c129ab8 100644 --- a/src/pentesting-cloud/kubernetes-security/kubernetes-role-based-access-control-rbac.md +++ b/src/pentesting-cloud/kubernetes-security/kubernetes-role-based-access-control-rbac.md @@ -166,4 +166,3 @@ abusing-roles-clusterroles-in-kubernetes/ - diff --git a/src/pentesting-cloud/kubernetes-security/kubernetes-validatingwebhookconfiguration.md b/src/pentesting-cloud/kubernetes-security/kubernetes-validatingwebhookconfiguration.md index 4b1ddd273..99a4fc6ae 100644 --- a/src/pentesting-cloud/kubernetes-security/kubernetes-validatingwebhookconfiguration.md +++ b/src/pentesting-cloud/kubernetes-security/kubernetes-validatingwebhookconfiguration.md @@ -103,4 +103,3 @@ abusing-roles-clusterroles-in-kubernetes/ - diff --git a/src/pentesting-cloud/kubernetes-security/pentesting-kubernetes-services/README.md b/src/pentesting-cloud/kubernetes-security/pentesting-kubernetes-services/README.md index f339ac821..5a9dc5477 100644 --- a/src/pentesting-cloud/kubernetes-security/pentesting-kubernetes-services/README.md +++ b/src/pentesting-cloud/kubernetes-security/pentesting-kubernetes-services/README.md @@ -215,4 +215,3 @@ https://labs.f-secure.com/blog/attacking-kubernetes-through-kubelet - diff --git a/src/pentesting-cloud/kubernetes-security/pentesting-kubernetes-services/kubelet-authentication-and-authorization.md b/src/pentesting-cloud/kubernetes-security/pentesting-kubernetes-services/kubelet-authentication-and-authorization.md index 7cb68dbd9..4542497ab 100644 --- a/src/pentesting-cloud/kubernetes-security/pentesting-kubernetes-services/kubelet-authentication-and-authorization.md +++ b/src/pentesting-cloud/kubernetes-security/pentesting-kubernetes-services/kubelet-authentication-and-authorization.md @@ -110,4 +110,3 @@ Forbidden (user=system:node:ip-172-31-28-172.ec2.internal, verb=get, resource=no - diff --git a/src/pentesting-cloud/openshift-pentesting/README.md b/src/pentesting-cloud/openshift-pentesting/README.md index 10c2e46ac..a49b1a3d6 100644 --- a/src/pentesting-cloud/openshift-pentesting/README.md +++ b/src/pentesting-cloud/openshift-pentesting/README.md @@ -20,4 +20,3 @@ openshift-privilege-escalation/ - diff --git a/src/pentesting-cloud/openshift-pentesting/openshift-basic-information.md b/src/pentesting-cloud/openshift-pentesting/openshift-basic-information.md index fb5103835..e3e5a9550 100644 --- a/src/pentesting-cloud/openshift-pentesting/openshift-basic-information.md +++ b/src/pentesting-cloud/openshift-pentesting/openshift-basic-information.md @@ -41,4 +41,3 @@ https://docs.openshift.com/container-platform/3.11/architecture/additional_conce - diff --git a/src/pentesting-cloud/openshift-pentesting/openshift-jenkins/README.md b/src/pentesting-cloud/openshift-pentesting/openshift-jenkins/README.md index 6edec0d9f..32b2c5e19 100644 --- a/src/pentesting-cloud/openshift-pentesting/openshift-jenkins/README.md +++ b/src/pentesting-cloud/openshift-pentesting/openshift-jenkins/README.md @@ -40,4 +40,3 @@ openshift-jenkins-build-overrides.md - diff --git a/src/pentesting-cloud/openshift-pentesting/openshift-jenkins/openshift-jenkins-build-overrides.md b/src/pentesting-cloud/openshift-pentesting/openshift-jenkins/openshift-jenkins-build-overrides.md index fb2aca679..d17a6c641 100644 --- a/src/pentesting-cloud/openshift-pentesting/openshift-jenkins/openshift-jenkins-build-overrides.md +++ b/src/pentesting-cloud/openshift-pentesting/openshift-jenkins/openshift-jenkins-build-overrides.md @@ -275,4 +275,3 @@ pipeline { - diff --git a/src/pentesting-cloud/openshift-pentesting/openshift-privilege-escalation/README.md b/src/pentesting-cloud/openshift-pentesting/openshift-privilege-escalation/README.md index 43ad1ade4..a5ab6e551 100644 --- a/src/pentesting-cloud/openshift-pentesting/openshift-privilege-escalation/README.md +++ b/src/pentesting-cloud/openshift-pentesting/openshift-privilege-escalation/README.md @@ -20,4 +20,3 @@ openshift-scc-bypass.md - diff --git a/src/pentesting-cloud/openshift-pentesting/openshift-privilege-escalation/openshift-missing-service-account.md b/src/pentesting-cloud/openshift-pentesting/openshift-privilege-escalation/openshift-missing-service-account.md index f591b8026..b6db84101 100644 --- a/src/pentesting-cloud/openshift-pentesting/openshift-privilege-escalation/openshift-missing-service-account.md +++ b/src/pentesting-cloud/openshift-pentesting/openshift-privilege-escalation/openshift-missing-service-account.md @@ -24,4 +24,3 @@ https://github.com/maxDcb/OpenShiftGrapher - diff --git a/src/pentesting-cloud/openshift-pentesting/openshift-privilege-escalation/openshift-scc-bypass.md b/src/pentesting-cloud/openshift-pentesting/openshift-privilege-escalation/openshift-scc-bypass.md index 794430e16..7622ca20b 100644 --- a/src/pentesting-cloud/openshift-pentesting/openshift-privilege-escalation/openshift-scc-bypass.md +++ b/src/pentesting-cloud/openshift-pentesting/openshift-privilege-escalation/openshift-scc-bypass.md @@ -139,4 +139,3 @@ To bypass GateKeeper's rules and set this label to execute a cluster takeover, * - diff --git a/src/pentesting-cloud/openshift-pentesting/openshift-privilege-escalation/openshift-tekton.md b/src/pentesting-cloud/openshift-pentesting/openshift-privilege-escalation/openshift-tekton.md index 45080c799..8926bc2ba 100644 --- a/src/pentesting-cloud/openshift-pentesting/openshift-privilege-escalation/openshift-tekton.md +++ b/src/pentesting-cloud/openshift-pentesting/openshift-privilege-escalation/openshift-tekton.md @@ -76,4 +76,3 @@ spec: - diff --git a/src/pentesting-cloud/openshift-pentesting/openshift-scc.md b/src/pentesting-cloud/openshift-pentesting/openshift-scc.md index 46fb57c6f..3a935d8c7 100644 --- a/src/pentesting-cloud/openshift-pentesting/openshift-scc.md +++ b/src/pentesting-cloud/openshift-pentesting/openshift-scc.md @@ -69,4 +69,3 @@ openshift-privilege-escalation/openshift-scc-bypass.md - diff --git a/src/pentesting-cloud/workspace-security/README.md b/src/pentesting-cloud/workspace-security/README.md index a0f6a7e9b..c44769158 100644 --- a/src/pentesting-cloud/workspace-security/README.md +++ b/src/pentesting-cloud/workspace-security/README.md @@ -74,4 +74,3 @@ gws-persistence.md - diff --git a/src/pentesting-cloud/workspace-security/gws-google-platforms-phishing/README.md b/src/pentesting-cloud/workspace-security/gws-google-platforms-phishing/README.md index 2e2a9b874..37de98684 100644 --- a/src/pentesting-cloud/workspace-security/gws-google-platforms-phishing/README.md +++ b/src/pentesting-cloud/workspace-security/gws-google-platforms-phishing/README.md @@ -166,4 +166,3 @@ It's possible to do something using gcloud instead of the web console, check: - diff --git a/src/pentesting-cloud/workspace-security/gws-google-platforms-phishing/gws-app-scripts.md b/src/pentesting-cloud/workspace-security/gws-google-platforms-phishing/gws-app-scripts.md index d6f166da8..096a078b7 100644 --- a/src/pentesting-cloud/workspace-security/gws-google-platforms-phishing/gws-app-scripts.md +++ b/src/pentesting-cloud/workspace-security/gws-google-platforms-phishing/gws-app-scripts.md @@ -236,4 +236,3 @@ Moreover, if someone **shared** with you a document with **editor access**, you - diff --git a/src/pentesting-cloud/workspace-security/gws-persistence.md b/src/pentesting-cloud/workspace-security/gws-persistence.md index 1061458fd..dc74c59ae 100644 --- a/src/pentesting-cloud/workspace-security/gws-persistence.md +++ b/src/pentesting-cloud/workspace-security/gws-persistence.md @@ -183,4 +183,3 @@ gws-google-platforms-phishing/gws-app-scripts.md - diff --git a/src/pentesting-cloud/workspace-security/gws-post-exploitation.md b/src/pentesting-cloud/workspace-security/gws-post-exploitation.md index a78597271..dec2ceaa0 100644 --- a/src/pentesting-cloud/workspace-security/gws-post-exploitation.md +++ b/src/pentesting-cloud/workspace-security/gws-post-exploitation.md @@ -75,4 +75,3 @@ You can also find emails by searching through all the user's invoices in [**http - diff --git a/src/pentesting-cloud/workspace-security/gws-workspace-sync-attacks-gcpw-gcds-gps-directory-sync-with-ad-and-entraid/README.md b/src/pentesting-cloud/workspace-security/gws-workspace-sync-attacks-gcpw-gcds-gps-directory-sync-with-ad-and-entraid/README.md index e7f4b93ae..285989cc3 100644 --- a/src/pentesting-cloud/workspace-security/gws-workspace-sync-attacks-gcpw-gcds-gps-directory-sync-with-ad-and-entraid/README.md +++ b/src/pentesting-cloud/workspace-security/gws-workspace-sync-attacks-gcpw-gcds-gps-directory-sync-with-ad-and-entraid/README.md @@ -59,4 +59,3 @@ gws-admin-directory-sync.md - diff --git a/src/pentesting-cloud/workspace-security/gws-workspace-sync-attacks-gcpw-gcds-gps-directory-sync-with-ad-and-entraid/gcds-google-cloud-directory-sync.md b/src/pentesting-cloud/workspace-security/gws-workspace-sync-attacks-gcpw-gcds-gps-directory-sync-with-ad-and-entraid/gcds-google-cloud-directory-sync.md index 15e78a699..70a23998f 100644 --- a/src/pentesting-cloud/workspace-security/gws-workspace-sync-attacks-gcpw-gcds-gps-directory-sync-with-ad-and-entraid/gcds-google-cloud-directory-sync.md +++ b/src/pentesting-cloud/workspace-security/gws-workspace-sync-attacks-gcpw-gcds-gps-directory-sync-with-ad-and-entraid/gcds-google-cloud-directory-sync.md @@ -341,4 +341,3 @@ curl -X POST \ - diff --git a/src/pentesting-cloud/workspace-security/gws-workspace-sync-attacks-gcpw-gcds-gps-directory-sync-with-ad-and-entraid/gcpw-google-credential-provider-for-windows.md b/src/pentesting-cloud/workspace-security/gws-workspace-sync-attacks-gcpw-gcds-gps-directory-sync-with-ad-and-entraid/gcpw-google-credential-provider-for-windows.md index db7a19b1b..d7ec34ebe 100644 --- a/src/pentesting-cloud/workspace-security/gws-workspace-sync-attacks-gcpw-gcds-gps-directory-sync-with-ad-and-entraid/gcpw-google-credential-provider-for-windows.md +++ b/src/pentesting-cloud/workspace-security/gws-workspace-sync-attacks-gcpw-gcds-gps-directory-sync-with-ad-and-entraid/gcpw-google-credential-provider-for-windows.md @@ -941,4 +941,3 @@ It's possible to find the key components of this in the Chromium source code: - diff --git a/src/pentesting-cloud/workspace-security/gws-workspace-sync-attacks-gcpw-gcds-gps-directory-sync-with-ad-and-entraid/gps-google-password-sync.md b/src/pentesting-cloud/workspace-security/gws-workspace-sync-attacks-gcpw-gcds-gps-directory-sync-with-ad-and-entraid/gps-google-password-sync.md index f94757b63..84fbf706c 100644 --- a/src/pentesting-cloud/workspace-security/gws-workspace-sync-attacks-gcpw-gcds-gps-directory-sync-with-ad-and-entraid/gps-google-password-sync.md +++ b/src/pentesting-cloud/workspace-security/gws-workspace-sync-attacks-gcpw-gcds-gps-directory-sync-with-ad-and-entraid/gps-google-password-sync.md @@ -193,4 +193,3 @@ Which is the same one you get if you don't indicate any scope. - diff --git a/src/pentesting-cloud/workspace-security/gws-workspace-sync-attacks-gcpw-gcds-gps-directory-sync-with-ad-and-entraid/gws-admin-directory-sync.md b/src/pentesting-cloud/workspace-security/gws-workspace-sync-attacks-gcpw-gcds-gps-directory-sync-with-ad-and-entraid/gws-admin-directory-sync.md index a74528e3b..c767f2a6e 100644 --- a/src/pentesting-cloud/workspace-security/gws-workspace-sync-attacks-gcpw-gcds-gps-directory-sync-with-ad-and-entraid/gws-admin-directory-sync.md +++ b/src/pentesting-cloud/workspace-security/gws-workspace-sync-attacks-gcpw-gcds-gps-directory-sync-with-ad-and-entraid/gws-admin-directory-sync.md @@ -58,4 +58,3 @@ I also don't know where does Google store the AD credentials or EntraID token an -