Translated ['src/README.md', 'src/banners/hacktricks-training.md', 'src/

This commit is contained in:
Translator
2024-12-31 20:18:58 +00:00
parent 820dd99aed
commit 931ae54e5f
245 changed files with 9984 additions and 12710 deletions

View File

@@ -4,11 +4,10 @@
## AWS - Lightsail
Amazon Lightsail provides an **easy**, lightweight way for new cloud users to take advantage of AWS cloud computing services. It allows you to deploy common and custom web services in seconds via **VMs** (**EC2**) and **containers**.\
It's a **minimal EC2 + Route53 + ECS**.
Amazon Lightsail offre un modo **facile** e leggero per i nuovi utenti del cloud di sfruttare i servizi di cloud computing di AWS. Ti consente di distribuire servizi web comuni e personalizzati in pochi secondi tramite **VM** (**EC2**) e **contenitori**.\
È un **EC2 minimo + Route53 + ECS**.
### Enumeration
```bash
# Instances
aws lightsail get-instances #Get all
@@ -29,14 +28,13 @@ aws lightsail get-load-balancers
aws lightsail get-static-ips
aws lightsail get-key-pairs
```
### Analizza Snapshot
### Analyse Snapshots
È possibile generare **snapshot di istanze e database relazionali da lightsail**. Pertanto, puoi controllarli allo stesso modo in cui puoi controllare [**snapshot EC2**](aws-ec2-ebs-elb-ssm-vpc-and-vpn-enum/#ebs) e [**snapshot RDS**](aws-relational-database-rds-enum.md#enumeration).
It's possible to generate **instance and relational database snapshots from lightsail**. Therefore you can check those the same way you can check [**EC2 snapshots**](aws-ec2-ebs-elb-ssm-vpc-and-vpn-enum/#ebs) and [**RDS snapshots**](aws-relational-database-rds-enum.md#enumeration).
### Metadati
### Metadata
**Metadata endpoint is accessible from lightsail**, but the machines are running in an **AWS account managed by AWS** so you don't control **what permissions are being granted**. However, if you find a way to exploit those you would be directly exploiting AWS.
**L'endpoint dei metadati è accessibile da lightsail**, ma le macchine sono in esecuzione in un **account AWS gestito da AWS** quindi non controlli **quali permessi vengono concessi**. Tuttavia, se trovi un modo per sfruttarli, staresti sfruttando direttamente AWS.
### Privesc
@@ -44,20 +42,16 @@ It's possible to generate **instance and relational database snapshots from ligh
../aws-privilege-escalation/aws-lightsail-privesc.md
{{#endref}}
### Post Exploitation
### Post Sfruttamento
{{#ref}}
../aws-post-exploitation/aws-lightsail-post-exploitation.md
{{#endref}}
### Persistence
### Persistenza
{{#ref}}
../aws-persistence/aws-lightsail-persistence.md
{{#endref}}
{{#include ../../../banners/hacktricks-training.md}}