Fix unmatched refs

This commit is contained in:
Translator
2025-10-09 10:28:37 +00:00
parent c484d4eca9
commit 9861e54dfa
36 changed files with 97 additions and 97 deletions

View File

@@ -16,7 +16,7 @@ As geloofsbriewe in Codebuild gestel is om met Github, Gitlab of Bitbucket te ve
Daarom, as jy toegang het om die geheime bestuurder te lees, sal jy in staat wees om hierdie geheime te verkry en na die gekonnekteerde platform te pivot.
{{#ref}}
../../aws-privilege-escalation/aws-secrets-manager-privesc.md
../../aws-privilege-escalation/aws-secrets-manager-privesc/README.md
{{#endref}}
### Misbruik van CodeBuild Repo Toegang

View File

@@ -263,25 +263,25 @@ Om 'n API-sleutel te laat werk, moet jy dit by 'n **Gebruik Plan** voeg, hierdie
## Ongeauthentiseerde Toegang
{{#ref}}
../aws-unauthenticated-enum-access/aws-api-gateway-unauthenticated-enum.md
../aws-unauthenticated-enum-access/aws-api-gateway-unauthenticated-enum/README.md
{{#endref}}
## Privesc
{{#ref}}
../aws-privilege-escalation/aws-apigateway-privesc.md
../aws-privilege-escalation/aws-apigateway-privesc/README.md
{{#endref}}
## Post Exploitation
{{#ref}}
../aws-post-exploitation/aws-api-gateway-post-exploitation.md
../aws-post-exploitation/aws-api-gateway-post-exploitation/README.md
{{#endref}}
## Persistensie
{{#ref}}
../aws-persistence/aws-api-gateway-persistence.md
../aws-persistence/aws-api-gateway-persistence/README.md
{{#endref}}
{{#include ../../../banners/hacktricks-training.md}}

View File

@@ -40,7 +40,7 @@ In die volgende bladsy kan jy kyk hoe om **cloudformation-toestemmings te misbru
### Persistence
{{#ref}}
../aws-persistence/aws-cloudformation-persistence.md
../aws-persistence/aws-cloudformation-persistence/README.md
{{#endref}}
### Post-Exploitation

View File

@@ -30,13 +30,13 @@ aws cloudfront list-distributions | jq ".DistributionList.Items[] | .Id, .Origin
## Ongeauthentiseerde Toegang
{{#ref}}
../aws-unauthenticated-enum-access/aws-cloudfront-unauthenticated-enum.md
../aws-unauthenticated-enum-access/aws-cloudfront-unauthenticated-enum/README.md
{{#endref}}
## Na Exploitatie
{{#ref}}
../aws-post-exploitation/aws-cloudfront-post-exploitation.md
../aws-post-exploitation/aws-cloudfront-post-exploitation/README.md
{{#endref}}
{{#include ../../../banners/hacktricks-training.md}}

View File

@@ -52,7 +52,7 @@ aws codebuild describe-test-cases --report-arn <ARN>
In die volgende bladsy kan jy kyk hoe om **kodebou toestemmings te misbruik om voorregte te verhoog**:
{{#ref}}
../aws-privilege-escalation/aws-codebuild-privesc.md
../aws-privilege-escalation/aws-codebuild-privesc/README.md
{{#endref}}
### Post Exploitation
@@ -64,7 +64,7 @@ In die volgende bladsy kan jy kyk hoe om **kodebou toestemmings te misbruik om v
### Unauthenticated Access
{{#ref}}
../aws-unauthenticated-enum-access/aws-codebuild-unauthenticated-access.md
../aws-unauthenticated-enum-access/aws-codebuild-unauthenticated-access/README.md
{{#endref}}
## References

View File

@@ -82,19 +82,19 @@ Selfs as jy **nie 'n geldige gebruikersnaam** binne Cognito weet nie, mag jy in
## Privesc
{{#ref}}
../../aws-privilege-escalation/aws-cognito-privesc.md
../../aws-privilege-escalation/aws-cognito-privesc/README.md
{{#endref}}
## Ongeauthentiseerde Toegang
{{#ref}}
../../aws-unauthenticated-enum-access/aws-cognito-unauthenticated-enum.md
../../aws-unauthenticated-enum-access/aws-cognito-unauthenticated-enum/README.md
{{#endref}}
## Volharding
{{#ref}}
../../aws-persistence/aws-cognito-persistence.md
../../aws-persistence/aws-cognito-persistence/README.md
{{#endref}}
{{#include ../../../../banners/hacktricks-training.md}}

View File

@@ -28,7 +28,7 @@ aws datapipeline get-pipeline-definition --pipeline-id <ID>
In die volgende bladsy kan jy kyk hoe om **datapipeline-toestemmings te misbruik om voorregte te verhoog**:
{{#ref}}
../aws-privilege-escalation/aws-datapipeline-privesc.md
../aws-privilege-escalation/aws-datapipeline-privesc/README.md
{{#endref}}
## CodePipeline
@@ -49,7 +49,7 @@ aws codepipeline get-pipeline-state --name <pipeline_name>
In die volgende bladsy kan jy kyk hoe om **codepipeline toestemmings te misbruik om voorregte te verhoog**:
{{#ref}}
../aws-privilege-escalation/aws-codepipeline-privesc.md
../aws-privilege-escalation/aws-codepipeline-privesc/README.md
{{#endref}}
## CodeCommit

View File

@@ -48,7 +48,7 @@ Let daarop dat as die **beskrywing** van die gids 'n **domein** in die veld **`A
### Privilege Escalation
{{#ref}}
../aws-privilege-escalation/aws-directory-services-privesc.md
../aws-privilege-escalation/aws-directory-services-privesc/README.md
{{#endref}}
## Volharding
@@ -109,7 +109,7 @@ aws workdocs add-resource-permissions --resource-id <id> --principals Id=anonymo
### Privesc
{{#ref}}
../aws-privilege-escalation/aws-workdocs-privesc.md
../aws-privilege-escalation/aws-workdocs-privesc/README.md
{{#endref}}
{{#include ../../../banners/hacktricks-training.md}}

View File

@@ -56,25 +56,25 @@ aws dynamodb describe-endpoints #Dynamodb endpoints
### Ongeauthentiseerde Toegang
{{#ref}}
../aws-unauthenticated-enum-access/aws-dynamodb-unauthenticated-access.md
../aws-unauthenticated-enum-access/aws-dynamodb-unauthenticated-access/README.md
{{#endref}}
### Privilege Escalation
{{#ref}}
../aws-privilege-escalation/aws-dynamodb-privesc.md
../aws-privilege-escalation/aws-dynamodb-privesc/README.md
{{#endref}}
### Post Exploitatie
{{#ref}}
../aws-post-exploitation/aws-dynamodb-post-exploitation.md
../aws-post-exploitation/aws-dynamodb-post-exploitation/README.md
{{#endref}}
### Volharding
{{#ref}}
../aws-persistence/aws-dynamodb-persistence.md
../aws-persistence/aws-dynamodb-persistence/README.md
{{#endref}}
## DynamoDB Inspuiting

View File

@@ -130,7 +130,7 @@ aws ec2 describe-vpc-peering-connections
### Ongeauthentiseerde Toegang
{{#ref}}
../../aws-unauthenticated-enum-access/aws-ec2-unauthenticated-enum.md
../../aws-unauthenticated-enum-access/aws-ec2-unauthenticated-enum/README.md
{{#endref}}
### Privilege Escalation
@@ -138,7 +138,7 @@ aws ec2 describe-vpc-peering-connections
Op die volgende bladsy kan jy kyk hoe om **EC2-toestemmings te misbruik om voorregte te verhoog**:
{{#ref}}
../../aws-privilege-escalation/aws-ec2-privesc.md
../../aws-privilege-escalation/aws-ec2-privesc/README.md
{{#endref}}
### Post-Exploitation
@@ -162,7 +162,7 @@ Snapshots kan **sensitiewe inligting** soos **bronkode of API sleutels** bevat,
Op die volgende bladsy kan jy kyk hoe om **EBS-toestemmings te misbruik om voorregte te verhoog**:
{{#ref}}
../../aws-privilege-escalation/aws-ebs-privesc.md
../../aws-privilege-escalation/aws-ebs-privesc/README.md
{{#endref}}
## SSM
@@ -191,7 +191,7 @@ ps aux | grep amazon-ssm
In die volgende bladsy kan jy kyk hoe om **SSM-toestemmings te misbruik om voorregte te eskaleer**:
{{#ref}}
../../aws-privilege-escalation/aws-ssm-privesc.md
../../aws-privilege-escalation/aws-ssm-privesc/README.md
{{#endref}}
### Persistensie
@@ -199,7 +199,7 @@ In die volgende bladsy kan jy kyk hoe om **SSM-toestemmings te misbruik om voorr
In die volgende bladsy kan jy kyk hoe om **SSM-toestemmings te misbruik om persistensie te bereik**:
{{#ref}}
../../aws-persistence/aws-ssm-persistence.md
../../aws-persistence/aws-ssm-persistence/README.md
{{#endref}}
## ELB
@@ -312,7 +312,7 @@ As 'n **VPN-verbinding gevestig is**, moet jy soek na **`.opvn`** konfigurasie l
#### **Ná Exploitatie**
{{#ref}}
../../aws-post-exploitation/aws-vpn-post-exploitation.md
../../aws-post-exploitation/aws-vpn-post-exploitation/README.md
{{#endref}}
## Verwysings

View File

@@ -68,7 +68,7 @@ aws ecr get-repository-policy --repository-name <repo_name>
### Ongeauthentiseerde Enum
{{#ref}}
../aws-unauthenticated-enum-access/aws-ecr-unauthenticated-enum.md
../aws-unauthenticated-enum-access/aws-ecr-unauthenticated-enum/README.md
{{#endref}}
### Privesc
@@ -76,19 +76,19 @@ aws ecr get-repository-policy --repository-name <repo_name>
In die volgende bladsy kan jy kyk hoe om **ECR-toestemmings te misbruik om voorregte te verhoog**:
{{#ref}}
../aws-privilege-escalation/aws-ecr-privesc.md
../aws-privilege-escalation/aws-ecr-privesc/README.md
{{#endref}}
### Post Exploitatie
{{#ref}}
../aws-post-exploitation/aws-ecr-post-exploitation.md
../aws-post-exploitation/aws-ecr-post-exploitation/README.md
{{#endref}}
### Volharding
{{#ref}}
../aws-persistence/aws-ecr-persistence.md
../aws-persistence/aws-ecr-persistence/README.md
{{#endref}}
## Verwysings

View File

@@ -54,7 +54,7 @@ aws ecs describe-task-definition --task-definition <TASK_NAME>:<VERSION>
### Ongeauthentiseerde Toegang
{{#ref}}
../aws-unauthenticated-enum-access/aws-ecs-unauthenticated-enum.md
../aws-unauthenticated-enum-access/aws-ecs-unauthenticated-enum/README.md
{{#endref}}
### Privilege Escalation
@@ -62,19 +62,19 @@ aws ecs describe-task-definition --task-definition <TASK_NAME>:<VERSION>
In die volgende bladsy kan jy kyk hoe om **ECS-toestemmings te misbruik om voorregte te verhoog**:
{{#ref}}
../aws-privilege-escalation/aws-ecs-privesc.md
../aws-privilege-escalation/aws-ecs-privesc/README.md
{{#endref}}
### Post Exploitatie
{{#ref}}
../aws-post-exploitation/aws-ecs-post-exploitation.md
../aws-post-exploitation/aws-ecs-post-exploitation/README.md
{{#endref}}
### Volharding
{{#ref}}
../aws-persistence/aws-ecs-persistence.md
../aws-persistence/aws-ecs-persistence/README.md
{{#endref}}
{{#include ../../../banners/hacktricks-training.md}}

View File

@@ -214,19 +214,19 @@ get_efs_info(ip_address)
## Privesc
{{#ref}}
../aws-privilege-escalation/aws-efs-privesc.md
../aws-privilege-escalation/aws-efs-privesc/README.md
{{#endref}}
## Post Exploitation
{{#ref}}
../aws-post-exploitation/aws-efs-post-exploitation.md
../aws-post-exploitation/aws-efs-post-exploitation/README.md
{{#endref}}
## Persistensie
{{#ref}}
../aws-persistence/aws-efs-persistence.md
../aws-persistence/aws-efs-persistence/README.md
{{#endref}}
{{#include ../../../banners/hacktricks-training.md}}

View File

@@ -34,7 +34,7 @@ aws eks describe-update --name <name> --update-id <id>
#### Post Exploitation
{{#ref}}
../aws-post-exploitation/aws-eks-post-exploitation.md
../aws-post-exploitation/aws-eks-post-exploitation/README.md
{{#endref}}
## Verwysings

View File

@@ -87,25 +87,25 @@ aws elasticbeanstalk describe-events
### Ongeauthentiseerde Toegang
{{#ref}}
../aws-unauthenticated-enum-access/aws-elastic-beanstalk-unauthenticated-enum.md
../aws-unauthenticated-enum-access/aws-elastic-beanstalk-unauthenticated-enum/README.md
{{#endref}}
### Volharding
{{#ref}}
../aws-persistence/aws-elastic-beanstalk-persistence.md
../aws-persistence/aws-elastic-beanstalk-persistence/README.md
{{#endref}}
### Privilege Escalation
{{#ref}}
../aws-privilege-escalation/aws-elastic-beanstalk-privesc.md
../aws-privilege-escalation/aws-elastic-beanstalk-privesc/README.md
{{#endref}}
### Post Exploitatie
{{#ref}}
../aws-post-exploitation/aws-elastic-beanstalk-post-exploitation.md
../aws-post-exploitation/aws-elastic-beanstalk-post-exploitation/README.md
{{#endref}}
{{#include ../../../banners/hacktricks-training.md}}

View File

@@ -48,7 +48,7 @@ aws emr list-studios #Get studio URLs
#### Privesc
{{#ref}}
../aws-privilege-escalation/aws-emr-privesc.md
../aws-privilege-escalation/aws-emr-privesc/README.md
{{#endref}}
## Verwysings

View File

@@ -213,7 +213,7 @@ Geen van die vorige gereedskap is in staat om naby al die toestemmings te kontro
### Ongeauthentiseerde Toegang
{{#ref}}
../aws-unauthenticated-enum-access/aws-iam-and-sts-unauthenticated-enum.md
../aws-unauthenticated-enum-access/aws-iam-and-sts-unauthenticated-enum/README.md
{{#endref}}
### Privilege Escalation
@@ -221,19 +221,19 @@ Geen van die vorige gereedskap is in staat om naby al die toestemmings te kontro
Op die volgende bladsy kan jy kyk hoe om **IAM-toestemmings te misbruik om voorregte te verhoog**:
{{#ref}}
../aws-privilege-escalation/aws-iam-privesc.md
../aws-privilege-escalation/aws-iam-privesc/README.md
{{#endref}}
### IAM Post Exploitation
{{#ref}}
../aws-post-exploitation/aws-iam-post-exploitation.md
../aws-post-exploitation/aws-iam-post-exploitation/README.md
{{#endref}}
### IAM Persistence
{{#ref}}
../aws-persistence/aws-iam-persistence.md
../aws-persistence/aws-iam-persistence/README.md
{{#endref}}
## IAM Identiteitsentrum
@@ -340,19 +340,19 @@ external_id = 123456
### Ongeauthentiseerde Toegang
{{#ref}}
../aws-unauthenticated-enum-access/aws-identity-center-and-sso-unauthenticated-enum.md
../aws-unauthenticated-enum-access/aws-identity-center-and-sso-unauthenticated-enum/README.md
{{#endref}}
### Privilege Escalation
{{#ref}}
../aws-privilege-escalation/aws-sso-and-identitystore-privesc.md
../aws-privilege-escalation/aws-sso-and-identitystore-privesc/README.md
{{#endref}}
### Post Exploitation
{{#ref}}
../aws-post-exploitation/aws-sso-and-identitystore-post-exploitation.md
../aws-post-exploitation/aws-sso-and-identitystore-post-exploitation/README.md
{{#endref}}
### Volharding

View File

@@ -137,19 +137,19 @@ done
### Privesc
{{#ref}}
../aws-privilege-escalation/aws-kms-privesc.md
../aws-privilege-escalation/aws-kms-privesc/README.md
{{#endref}}
### Post Exploitation
{{#ref}}
../aws-post-exploitation/aws-kms-post-exploitation.md
../aws-post-exploitation/aws-kms-post-exploitation/README.md
{{#endref}}
### Persistence
{{#ref}}
../aws-persistence/aws-kms-persistence.md
../aws-persistence/aws-kms-persistence/README.md
{{#endref}}
## Verwysings

View File

@@ -143,13 +143,13 @@ Daar is baie ander bronne wat 'n lambda kan aktiveer
Op die volgende bladsy kan jy kyk hoe om **Lambda-toestemmings te misbruik om voorregte te verhoog**:
{{#ref}}
../aws-privilege-escalation/aws-lambda-privesc.md
../aws-privilege-escalation/aws-lambda-privesc/README.md
{{#endref}}
### Ongeauthentiseerde Toegang
{{#ref}}
../aws-unauthenticated-enum-access/aws-lambda-unauthenticated-access.md
../aws-unauthenticated-enum-access/aws-lambda-unauthenticated-access/README.md
{{#endref}}
### Post Exploitatie

View File

@@ -39,19 +39,19 @@ Dit is moontlik om **instansie en relationele databasis snapshots van lightsail*
### Privesc
{{#ref}}
../aws-privilege-escalation/aws-lightsail-privesc.md
../aws-privilege-escalation/aws-lightsail-privesc/README.md
{{#endref}}
### Post Exploitation
{{#ref}}
../aws-post-exploitation/aws-lightsail-post-exploitation.md
../aws-post-exploitation/aws-lightsail-post-exploitation/README.md
{{#endref}}
### Persistensie
{{#ref}}
../aws-persistence/aws-lightsail-persistence.md
../aws-persistence/aws-lightsail-persistence/README.md
{{#endref}}
{{#include ../../../banners/hacktricks-training.md}}

View File

@@ -123,7 +123,7 @@ aws macie2 get-usage-statistic
### Privesc
{{#ref}}
../aws-privilege-escalation/aws-macie-privesc.md
../aws-privilege-escalation/aws-macie-privesc/README.md
{{#endref}}
### Post Exploitation

View File

@@ -53,13 +53,13 @@ aws mq create-user --broker-id <value> --password <value> --username <value> --c
## Privesc
{{#ref}}
../aws-privilege-escalation/aws-mq-privesc.md
../aws-privilege-escalation/aws-mq-privesc/README.md
{{#endref}}
## Unauthenticated Access
{{#ref}}
../aws-unauthenticated-enum-access/aws-mq-unauthenticated-enum.md
../aws-unauthenticated-enum-access/aws-mq-unauthenticated-enum/README.md
{{#endref}}
## Persistence

View File

@@ -75,13 +75,13 @@ kafka_2.12-2.8.1/bin/kafka-console-consumer.sh --bootstrap-server $BS --consumer
### Privesc
{{#ref}}
../aws-privilege-escalation/aws-msk-privesc.md
../aws-privilege-escalation/aws-msk-privesc/README.md
{{#endref}}
### Unauthenticated Access
{{#ref}}
../aws-unauthenticated-enum-access/aws-msk-unauthenticated-enum.md
../aws-unauthenticated-enum-access/aws-msk-unauthenticated-enum/README.md
{{#endref}}
### Persistence

View File

@@ -84,7 +84,7 @@ psql -h redshift-cluster-1.sdflju3jdfkfg.us-east-1.redshift.amazonaws.com -U adm
## Privesc
{{#ref}}
../aws-privilege-escalation/aws-redshift-privesc.md
../aws-privilege-escalation/aws-redshift-privesc/README.md
{{#endref}}
## Volharding

View File

@@ -108,25 +108,25 @@ aws rds modify-db-instance --db-instance-identifier <ID> --master-user-password
### Ongeauthentiseerde Toegang
{{#ref}}
../aws-unauthenticated-enum-access/aws-rds-unauthenticated-enum.md
../aws-unauthenticated-enum-access/aws-rds-unauthenticated-enum/README.md
{{#endref}}
### Privilege Escalation
{{#ref}}
../aws-privilege-escalation/aws-rds-privesc.md
../aws-privilege-escalation/aws-rds-privesc/README.md
{{#endref}}
### Post Exploitatie
{{#ref}}
../aws-post-exploitation/aws-rds-post-exploitation.md
../aws-post-exploitation/aws-rds-post-exploitation/README.md
{{#endref}}
### Volharding
{{#ref}}
../aws-persistence/aws-rds-persistence.md
../aws-persistence/aws-rds-persistence/README.md
{{#endref}}
### SQL Inbraak

View File

@@ -23,7 +23,7 @@ aws route53 list-traffic-policies
### Privesc
{{#ref}}
../aws-privilege-escalation/route53-createhostedzone-route53-changeresourcerecordsets-acm-pca-issuecertificate-acm-pca-getcer.md
../aws-privilege-escalation/route53-createhostedzone-route53-changeresourcerecordsets-acm-pca-issuecertificate-acm-pca-getcer/README.md
{{#endref}}
{{#include ../../../banners/hacktricks-training.md}}

View File

@@ -241,25 +241,25 @@ Dual-stack eindpunte gebruik die volgende sintaksis:
In die volgende bladsy kan jy kyk hoe om **S3-toestemmings te misbruik om voorregte te verhoog**:
{{#ref}}
../aws-privilege-escalation/aws-s3-privesc.md
../aws-privilege-escalation/aws-s3-privesc/README.md
{{#endref}}
### Unauthenticated Access
{{#ref}}
../aws-unauthenticated-enum-access/aws-s3-unauthenticated-enum.md
../aws-unauthenticated-enum-access/aws-s3-unauthenticated-enum/README.md
{{#endref}}
### S3 Post Exploitation
{{#ref}}
../aws-post-exploitation/aws-s3-post-exploitation.md
../aws-post-exploitation/aws-s3-post-exploitation/README.md
{{#endref}}
### Persistence
{{#ref}}
../aws-persistence/aws-s3-persistence.md
../aws-persistence/aws-s3-persistence/README.md
{{#endref}}
## Other S3 vulns

View File

@@ -30,19 +30,19 @@ aws secretsmanager get-resource-policy --secret-id --secret-id <secret_name>
### Privesc
{{#ref}}
../aws-privilege-escalation/aws-secrets-manager-privesc.md
../aws-privilege-escalation/aws-secrets-manager-privesc/README.md
{{#endref}}
### Post Exploitation
{{#ref}}
../aws-post-exploitation/aws-secrets-manager-post-exploitation.md
../aws-post-exploitation/aws-secrets-manager-post-exploitation/README.md
{{#endref}}
### Persistensie
{{#ref}}
../aws-persistence/aws-secrets-manager-persistence.md
../aws-persistence/aws-secrets-manager-persistence/README.md
{{#endref}}
{{#include ../../../banners/hacktricks-training.md}}

View File

@@ -211,7 +211,7 @@ Daarom kan 'n gebruiker met toegang tot EKS wat die URL van die EKS API ontdek h
Meer inligting in:
{{#ref}}
../../aws-post-exploitation/aws-eks-post-exploitation.md
../../aws-post-exploitation/aws-eks-post-exploitation/README.md
{{#endref}}
### Wysig CloudTrail Konfigurasie
@@ -259,7 +259,7 @@ Jy kan **'n asimmetriese sleutel genereer** en **CloudTrail die data met daardie
Dit is basies **S3-KMS ransomware** wat verduidelik word in:
{{#ref}}
../../aws-post-exploitation/aws-s3-post-exploitation.md
../../aws-post-exploitation/aws-s3-post-exploitation/README.md
{{#endref}}
**KMS ransomware**
@@ -267,7 +267,7 @@ Dit is basies **S3-KMS ransomware** wat verduidelik word in:
Dit is 'n maklike manier om die vorige aanval met verskillende toestemmingsvereistes uit te voer:
{{#ref}}
../../aws-post-exploitation/aws-kms-post-exploitation.md
../../aws-post-exploitation/aws-kms-post-exploitation/README.md
{{#endref}}
## **Verwysings**

View File

@@ -34,7 +34,7 @@ aws controltower list-enabled-controls --target-identifier arn:aws:organizations
### Post Exploitation & Persistence
{{#ref}}
../../aws-post-exploitation/aws-control-tower-post-exploitation.md
../../aws-post-exploitation/aws-control-tower-post-exploitation/README.md
{{#endref}}
{{#include ../../../../banners/hacktricks-training.md}}

View File

@@ -115,7 +115,7 @@ aws ses get-send-statistics
### Post Exploitation
{{#ref}}
../aws-post-exploitation/aws-ses-post-exploitation.md
../aws-post-exploitation/aws-ses-post-exploitation/README.md
{{#endref}}
{{#include ../../../banners/hacktricks-training.md}}

View File

@@ -49,25 +49,25 @@ aws sns subscribe --region <region>\
#### Unauthenticated Access
{{#ref}}
../aws-unauthenticated-enum-access/aws-sns-unauthenticated-enum.md
../aws-unauthenticated-enum-access/aws-sns-unauthenticated-enum/README.md
{{#endref}}
#### Privilege Escalation
{{#ref}}
../aws-privilege-escalation/aws-sns-privesc.md
../aws-privilege-escalation/aws-sns-privesc/README.md
{{#endref}}
#### Post Exploitation
{{#ref}}
../aws-post-exploitation/aws-sns-post-exploitation.md
../aws-post-exploitation/aws-sns-post-exploitation/README.md
{{#endref}}
#### Persistence
{{#ref}}
../aws-persistence/aws-sns-persistence.md
../aws-persistence/aws-sns-persistence/README.md
{{#endref}}
## References

View File

@@ -23,25 +23,25 @@ aws sqs send-message --queue-url <value> --message-body <value>
#### Unauthenticated Access
{{#ref}}
../aws-unauthenticated-enum-access/aws-sqs-unauthenticated-enum.md
../aws-unauthenticated-enum-access/aws-sqs-unauthenticated-enum/README.md
{{#endref}}
#### Privilege Escalation
{{#ref}}
../aws-privilege-escalation/aws-sqs-privesc.md
../aws-privilege-escalation/aws-sqs-privesc/README.md
{{#endref}}
#### Post Exploitation
{{#ref}}
../aws-post-exploitation/aws-sqs-post-exploitation.md
../aws-post-exploitation/aws-sqs-post-exploitation/README.md
{{#endref}}
#### Persistence
{{#ref}}
../aws-persistence/aws-sqs-persistence.md
../aws-persistence/aws-sqs-persistence/README.md
{{#endref}}
## References

View File

@@ -302,19 +302,19 @@ aws stepfunctions list-executions --map-run-arn <value> [--status-filter <RUNNIN
In die volgende bladsy kan jy kyk hoe om **Step Functions toestemming te misbruik om voorregte te verhoog**:
{{#ref}}
../aws-privilege-escalation/aws-stepfunctions-privesc.md
../aws-privilege-escalation/aws-stepfunctions-privesc/README.md
{{#endref}}
## Post Exploitation
{{#ref}}
../aws-post-exploitation/aws-stepfunctions-post-exploitation.md
../aws-post-exploitation/aws-stepfunctions-post-exploitation/README.md
{{#endref}}
## Persistence
{{#ref}}
../aws-persistence/aws-step-functions-persistence.md
../aws-persistence/aws-step-functions-persistence/README.md
{{#endref}}
## References

View File

@@ -72,19 +72,19 @@ aws sts get-session-token --serial-number <arn_device> --token-code <otp_code>
In die volgende bladsy kan jy kyk hoe om **STS-toestemmings te misbruik om voorregte te verhoog**:
{{#ref}}
../aws-privilege-escalation/aws-sts-privesc.md
../aws-privilege-escalation/aws-sts-privesc/README.md
{{#endref}}
### Post Exploitation
{{#ref}}
../aws-post-exploitation/aws-sts-post-exploitation.md
../aws-post-exploitation/aws-sts-post-exploitation/README.md
{{#endref}}
### Persistence
{{#ref}}
../aws-persistence/aws-sts-persistence.md
../aws-persistence/aws-sts-persistence/README.md
{{#endref}}
## References

View File

@@ -67,7 +67,7 @@ aws scheduler list-tags-for-resource --resource-arn <schedule_group_arn>
In die volgende bladsy kan jy kyk hoe om **eventbridge scheduler toestemming te misbruik om voorregte te verhoog**:
{{#ref}}
../aws-privilege-escalation/eventbridgescheduler-privesc.md
../aws-privilege-escalation/eventbridgescheduler-privesc/README.md
{{#endref}}
## References