Translated ['src/pentesting-cloud/azure-security/az-permissions-for-a-pe

This commit is contained in:
Translator
2025-01-09 07:35:33 +00:00
parent 4d1f1bc5a3
commit 71c61c5807
2 changed files with 5 additions and 5 deletions

View File

@@ -46,8 +46,8 @@ def ref(matchobj):
match = re.search('<title>(.*?)</title>', raw_html)
title = match.group(1) if match else href
except Exception as e:
logger.debug(f'Error opening URL {href}: {e}')
pass #nDont stop on broken link
logger.error(f'Error opening URL {href}: {e}')
pass #Dont stop on broken link
else:
try:
if href.endswith("/"):
@@ -73,7 +73,7 @@ def ref(matchobj):
title = chapter["name"]
logger.debug(f'Recursive title search result: {chapter["name"]}')
except Exception as e:
logger.debug(e)
logger.error(f"Error: {e}")
logger.error(f'Error getting chapter title: {path.normpath(path.join(dir,href))}')
sys.exit(1)
@@ -101,7 +101,7 @@ def files(matchobj):
logger.debug(f'File search result: {os.path.join(root, href)}')
except Exception as e:
logger.debug(e)
logger.error(f"Error: {e}")
logger.error(f'Error searching file: {href}')
sys.exit(1)

View File

@@ -2,6 +2,6 @@
{{#include ../../banners/hacktricks-training.md}}
要开始测试,您应该拥有一个具有**订阅的读取权限**和**AzureAD中的全局读取角色**的用户访问权限。如果在这种情况下您仍然**无法访问存储帐户的内容**,您可以通过**角色存储帐户贡献者**来修复它。
要开始测试,您应该拥有一个具有 **订阅的读取权限****AzureAD中的全局读取角色** 的用户。如果在这种情况下您仍然 **无法访问存储帐户的内容**,您可以通过 **角色存储帐户贡献者** 来修复它。
{{#include ../../banners/hacktricks-training.md}}