translate everything

This commit is contained in:
Carlos Polop
2024-12-31 18:35:05 +01:00
parent 145008516e
commit 7770a50092
483 changed files with 1930 additions and 0 deletions

View File

@@ -41,3 +41,7 @@ do-services/
{{#endref}}
{{#include ../../banners/hacktricks-training.md}}

View File

@@ -133,3 +133,7 @@ The **logs of a team** can be found in [**https://cloud.digitalocean.com/account
- [https://docs.digitalocean.com/products/teams/how-to/manage-membership/](https://docs.digitalocean.com/products/teams/how-to/manage-membership/)
{{#include ../../banners/hacktricks-training.md}}

View File

@@ -5,3 +5,7 @@
DO doesn't support granular permissions. So the **minimum role** that allows a user to review all the resources is **member**. A pentester with this permission will be able to perform harmful activities, but it's what it's.
{{#include ../../banners/hacktricks-training.md}}

View File

@@ -17,3 +17,7 @@ DO offers a few services, here you can find how to **enumerate them:**
- [**Volumes**](do-volumes.md)
{{#include ../../../banners/hacktricks-training.md}}

View File

@@ -32,3 +32,7 @@ To execute code directly in the container executing the App you will need **acce
That will give you a **shell**, and just executing **`env`** you will be able to see **all the env vars** (including the ones defined as **encrypted**).
{{#include ../../../banners/hacktricks-training.md}}

View File

@@ -31,3 +31,7 @@ doctl registry repository list-v2
```
{{#include ../../../banners/hacktricks-training.md}}

View File

@@ -41,3 +41,7 @@ doctl databases pool list <db-id> # List pools of DB
```
{{#include ../../../banners/hacktricks-training.md}}

View File

@@ -79,3 +79,7 @@ With access to the console it's possible to **get a shell inside the droplet** a
It's also possible to launch a **recovery console** to run commands inside the host accessing a recovery console in **`https://cloud.digitalocean.com/droplets/<droplet-id>/console`**(but in this case you will need to know the root password).
{{#include ../../../banners/hacktricks-training.md}}

View File

@@ -58,3 +58,7 @@ doctl serverless activations result <activation-id> # get only the response resu
> There **isn't metadata endpoint** from the Functions sandbox.
{{#include ../../../banners/hacktricks-training.md}}

View File

@@ -17,3 +17,7 @@ doctl compute image list
```
{{#include ../../../banners/hacktricks-training.md}}

View File

@@ -37,3 +37,7 @@ doctl kubernetes cluster list-associated-resources <cluster-id>
```
{{#include ../../../banners/hacktricks-training.md}}

View File

@@ -43,3 +43,7 @@ doctl compute firewall remove-droplets <fw-id> --droplet-ids <droplet-id>
```
{{#include ../../../banners/hacktricks-training.md}}

View File

@@ -21,3 +21,7 @@ doctl projects resources list <proj-id> # Get all the resources of a project
```
{{#include ../../../banners/hacktricks-training.md}}

View File

@@ -44,3 +44,7 @@ aws s3 ls --endpoint=https://fra1.digitaloceanspaces.com s3://uniqbucketname
```
{{#include ../../../banners/hacktricks-training.md}}

View File

@@ -13,3 +13,7 @@ compute volume list
```
{{#include ../../../banners/hacktricks-training.md}}