Translated ['src/pentesting-cloud/azure-security/az-permissions-for-a-pe

This commit is contained in:
Translator
2025-01-09 07:35:37 +00:00
parent 9266129663
commit 959a569516
2 changed files with 6 additions and 7 deletions

View File

@@ -46,8 +46,8 @@ def ref(matchobj):
match = re.search('<title>(.*?)</title>', raw_html)
title = match.group(1) if match else href
except Exception as e:
logger.debug(f'Error opening URL {href}: {e}')
pass #nDont stop on broken link
logger.error(f'Error opening URL {href}: {e}')
pass #Dont stop on broken link
else:
try:
if href.endswith("/"):
@@ -73,7 +73,7 @@ def ref(matchobj):
title = chapter["name"]
logger.debug(f'Recursive title search result: {chapter["name"]}')
except Exception as e:
logger.debug(e)
logger.error(f"Error: {e}")
logger.error(f'Error getting chapter title: {path.normpath(path.join(dir,href))}')
sys.exit(1)
@@ -101,7 +101,7 @@ def files(matchobj):
logger.debug(f'File search result: {os.path.join(root, href)}')
except Exception as e:
logger.debug(e)
logger.error(f"Error: {e}")
logger.error(f'Error searching file: {href}')
sys.exit(1)

View File

@@ -1,8 +1,7 @@
# Az - Permissions for a Pentest
# Az - Toestemmings vir 'n Pentest
{{#include ../../banners/hacktricks-training.md}}
To start the tests you should have access with a user with **Reader permissions over the subscription** and **Global Reader role in AzureAD**. If even in that case you are **not able to access the content of the Storage accounts** you can fix it with the **role Storage Account Contributor**.
Om die toetse te begin, moet jy toegang hê met 'n gebruiker met **Leser toestemmings oor die intekening** en **Globale Leser rol in AzureAD**. As jy selfs in daardie geval **nie in staat is om die inhoud van die Stoor rekeninge te bekom nie**, kan jy dit regstel met die **rol Stoor Rekening Bydraer**.
{{#include ../../banners/hacktricks-training.md}}