From 9861e54dfaa21c614a432dd68f5af4b632b835df Mon Sep 17 00:00:00 2001 From: Translator Date: Thu, 9 Oct 2025 10:28:37 +0000 Subject: [PATCH] Fix unmatched refs --- .../aws-codebuild-post-exploitation/README.md | 2 +- .../aws-services/aws-api-gateway-enum.md | 8 ++++---- .../aws-cloudformation-and-codestar-enum.md | 2 +- .../aws-services/aws-cloudfront-enum.md | 4 ++-- .../aws-services/aws-codebuild-enum.md | 4 ++-- .../aws-services/aws-cognito-enum/README.md | 6 +++--- ...peline-codepipeline-codebuild-and-codecommit.md | 4 ++-- .../aws-directory-services-workdocs-enum.md | 4 ++-- .../aws-security/aws-services/aws-dynamodb-enum.md | 8 ++++---- .../aws-ec2-ebs-elb-ssm-vpc-and-vpn-enum/README.md | 12 ++++++------ .../aws-security/aws-services/aws-ecr-enum.md | 8 ++++---- .../aws-security/aws-services/aws-ecs-enum.md | 8 ++++---- .../aws-security/aws-services/aws-efs-enum.md | 6 +++--- .../aws-security/aws-services/aws-eks-enum.md | 2 +- .../aws-services/aws-elastic-beanstalk-enum.md | 8 ++++---- .../aws-security/aws-services/aws-emr-enum.md | 2 +- .../aws-security/aws-services/aws-iam-enum.md | 14 +++++++------- .../aws-security/aws-services/aws-kms-enum.md | 6 +++--- .../aws-security/aws-services/aws-lambda-enum.md | 4 ++-- .../aws-services/aws-lightsail-enum.md | 6 +++--- .../aws-security/aws-services/aws-macie-enum.md | 2 +- .../aws-security/aws-services/aws-mq-enum.md | 4 ++-- .../aws-security/aws-services/aws-msk-enum.md | 4 ++-- .../aws-security/aws-services/aws-redshift-enum.md | 2 +- .../aws-relational-database-rds-enum.md | 8 ++++---- .../aws-security/aws-services/aws-route53-enum.md | 2 +- .../aws-services/aws-s3-athena-and-glacier-enum.md | 8 ++++---- .../aws-services/aws-secrets-manager-enum.md | 6 +++--- .../aws-cloudtrail-enum.md | 6 +++--- .../aws-control-tower-enum.md | 2 +- .../aws-security/aws-services/aws-ses-enum.md | 2 +- .../aws-security/aws-services/aws-sns-enum.md | 8 ++++---- .../aws-services/aws-sqs-and-sns-enum.md | 8 ++++---- .../aws-services/aws-stepfunctions-enum.md | 6 +++--- .../aws-security/aws-services/aws-sts-enum.md | 6 +++--- .../aws-services/eventbridgescheduler-enum.md | 2 +- 36 files changed, 97 insertions(+), 97 deletions(-) diff --git a/src/pentesting-cloud/aws-security/aws-post-exploitation/aws-codebuild-post-exploitation/README.md b/src/pentesting-cloud/aws-security/aws-post-exploitation/aws-codebuild-post-exploitation/README.md index 5c7b49d17..5670514e3 100644 --- a/src/pentesting-cloud/aws-security/aws-post-exploitation/aws-codebuild-post-exploitation/README.md +++ b/src/pentesting-cloud/aws-security/aws-post-exploitation/aws-codebuild-post-exploitation/README.md @@ -16,7 +16,7 @@ As geloofsbriewe in Codebuild gestel is om met Github, Gitlab of Bitbucket te ve Daarom, as jy toegang het om die geheime bestuurder te lees, sal jy in staat wees om hierdie geheime te verkry en na die gekonnekteerde platform te pivot. {{#ref}} -../../aws-privilege-escalation/aws-secrets-manager-privesc.md +../../aws-privilege-escalation/aws-secrets-manager-privesc/README.md {{#endref}} ### Misbruik van CodeBuild Repo Toegang diff --git a/src/pentesting-cloud/aws-security/aws-services/aws-api-gateway-enum.md b/src/pentesting-cloud/aws-security/aws-services/aws-api-gateway-enum.md index 6e887ebcb..4639d9cf7 100644 --- a/src/pentesting-cloud/aws-security/aws-services/aws-api-gateway-enum.md +++ b/src/pentesting-cloud/aws-security/aws-services/aws-api-gateway-enum.md @@ -263,25 +263,25 @@ Om 'n API-sleutel te laat werk, moet jy dit by 'n **Gebruik Plan** voeg, hierdie ## Ongeauthentiseerde Toegang {{#ref}} -../aws-unauthenticated-enum-access/aws-api-gateway-unauthenticated-enum.md +../aws-unauthenticated-enum-access/aws-api-gateway-unauthenticated-enum/README.md {{#endref}} ## Privesc {{#ref}} -../aws-privilege-escalation/aws-apigateway-privesc.md +../aws-privilege-escalation/aws-apigateway-privesc/README.md {{#endref}} ## Post Exploitation {{#ref}} -../aws-post-exploitation/aws-api-gateway-post-exploitation.md +../aws-post-exploitation/aws-api-gateway-post-exploitation/README.md {{#endref}} ## Persistensie {{#ref}} -../aws-persistence/aws-api-gateway-persistence.md +../aws-persistence/aws-api-gateway-persistence/README.md {{#endref}} {{#include ../../../banners/hacktricks-training.md}} diff --git a/src/pentesting-cloud/aws-security/aws-services/aws-cloudformation-and-codestar-enum.md b/src/pentesting-cloud/aws-security/aws-services/aws-cloudformation-and-codestar-enum.md index 292ed877d..ad5e59fd9 100644 --- a/src/pentesting-cloud/aws-security/aws-services/aws-cloudformation-and-codestar-enum.md +++ b/src/pentesting-cloud/aws-security/aws-services/aws-cloudformation-and-codestar-enum.md @@ -40,7 +40,7 @@ In die volgende bladsy kan jy kyk hoe om **cloudformation-toestemmings te misbru ### Persistence {{#ref}} -../aws-persistence/aws-cloudformation-persistence.md +../aws-persistence/aws-cloudformation-persistence/README.md {{#endref}} ### Post-Exploitation diff --git a/src/pentesting-cloud/aws-security/aws-services/aws-cloudfront-enum.md b/src/pentesting-cloud/aws-security/aws-services/aws-cloudfront-enum.md index 9c25f6e4a..7ed6396bf 100644 --- a/src/pentesting-cloud/aws-security/aws-services/aws-cloudfront-enum.md +++ b/src/pentesting-cloud/aws-security/aws-services/aws-cloudfront-enum.md @@ -30,13 +30,13 @@ aws cloudfront list-distributions | jq ".DistributionList.Items[] | .Id, .Origin ## Ongeauthentiseerde Toegang {{#ref}} -../aws-unauthenticated-enum-access/aws-cloudfront-unauthenticated-enum.md +../aws-unauthenticated-enum-access/aws-cloudfront-unauthenticated-enum/README.md {{#endref}} ## Na Exploitatie {{#ref}} -../aws-post-exploitation/aws-cloudfront-post-exploitation.md +../aws-post-exploitation/aws-cloudfront-post-exploitation/README.md {{#endref}} {{#include ../../../banners/hacktricks-training.md}} diff --git a/src/pentesting-cloud/aws-security/aws-services/aws-codebuild-enum.md b/src/pentesting-cloud/aws-security/aws-services/aws-codebuild-enum.md index 57828a35e..146f557f0 100644 --- a/src/pentesting-cloud/aws-security/aws-services/aws-codebuild-enum.md +++ b/src/pentesting-cloud/aws-security/aws-services/aws-codebuild-enum.md @@ -52,7 +52,7 @@ aws codebuild describe-test-cases --report-arn In die volgende bladsy kan jy kyk hoe om **kodebou toestemmings te misbruik om voorregte te verhoog**: {{#ref}} -../aws-privilege-escalation/aws-codebuild-privesc.md +../aws-privilege-escalation/aws-codebuild-privesc/README.md {{#endref}} ### Post Exploitation @@ -64,7 +64,7 @@ In die volgende bladsy kan jy kyk hoe om **kodebou toestemmings te misbruik om v ### Unauthenticated Access {{#ref}} -../aws-unauthenticated-enum-access/aws-codebuild-unauthenticated-access.md +../aws-unauthenticated-enum-access/aws-codebuild-unauthenticated-access/README.md {{#endref}} ## References diff --git a/src/pentesting-cloud/aws-security/aws-services/aws-cognito-enum/README.md b/src/pentesting-cloud/aws-security/aws-services/aws-cognito-enum/README.md index 276467246..48a628dba 100644 --- a/src/pentesting-cloud/aws-security/aws-services/aws-cognito-enum/README.md +++ b/src/pentesting-cloud/aws-security/aws-services/aws-cognito-enum/README.md @@ -82,19 +82,19 @@ Selfs as jy **nie 'n geldige gebruikersnaam** binne Cognito weet nie, mag jy in ## Privesc {{#ref}} -../../aws-privilege-escalation/aws-cognito-privesc.md +../../aws-privilege-escalation/aws-cognito-privesc/README.md {{#endref}} ## Ongeauthentiseerde Toegang {{#ref}} -../../aws-unauthenticated-enum-access/aws-cognito-unauthenticated-enum.md +../../aws-unauthenticated-enum-access/aws-cognito-unauthenticated-enum/README.md {{#endref}} ## Volharding {{#ref}} -../../aws-persistence/aws-cognito-persistence.md +../../aws-persistence/aws-cognito-persistence/README.md {{#endref}} {{#include ../../../../banners/hacktricks-training.md}} diff --git a/src/pentesting-cloud/aws-security/aws-services/aws-datapipeline-codepipeline-codebuild-and-codecommit.md b/src/pentesting-cloud/aws-security/aws-services/aws-datapipeline-codepipeline-codebuild-and-codecommit.md index d990a7536..d6a386b78 100644 --- a/src/pentesting-cloud/aws-security/aws-services/aws-datapipeline-codepipeline-codebuild-and-codecommit.md +++ b/src/pentesting-cloud/aws-security/aws-services/aws-datapipeline-codepipeline-codebuild-and-codecommit.md @@ -28,7 +28,7 @@ aws datapipeline get-pipeline-definition --pipeline-id In die volgende bladsy kan jy kyk hoe om **datapipeline-toestemmings te misbruik om voorregte te verhoog**: {{#ref}} -../aws-privilege-escalation/aws-datapipeline-privesc.md +../aws-privilege-escalation/aws-datapipeline-privesc/README.md {{#endref}} ## CodePipeline @@ -49,7 +49,7 @@ aws codepipeline get-pipeline-state --name In die volgende bladsy kan jy kyk hoe om **codepipeline toestemmings te misbruik om voorregte te verhoog**: {{#ref}} -../aws-privilege-escalation/aws-codepipeline-privesc.md +../aws-privilege-escalation/aws-codepipeline-privesc/README.md {{#endref}} ## CodeCommit diff --git a/src/pentesting-cloud/aws-security/aws-services/aws-directory-services-workdocs-enum.md b/src/pentesting-cloud/aws-security/aws-services/aws-directory-services-workdocs-enum.md index c7bf81ed7..45a4c304d 100644 --- a/src/pentesting-cloud/aws-security/aws-services/aws-directory-services-workdocs-enum.md +++ b/src/pentesting-cloud/aws-security/aws-services/aws-directory-services-workdocs-enum.md @@ -48,7 +48,7 @@ Let daarop dat as die **beskrywing** van die gids 'n **domein** in die veld **`A ### Privilege Escalation {{#ref}} -../aws-privilege-escalation/aws-directory-services-privesc.md +../aws-privilege-escalation/aws-directory-services-privesc/README.md {{#endref}} ## Volharding @@ -109,7 +109,7 @@ aws workdocs add-resource-permissions --resource-id --principals Id=anonymo ### Privesc {{#ref}} -../aws-privilege-escalation/aws-workdocs-privesc.md +../aws-privilege-escalation/aws-workdocs-privesc/README.md {{#endref}} {{#include ../../../banners/hacktricks-training.md}} diff --git a/src/pentesting-cloud/aws-security/aws-services/aws-dynamodb-enum.md b/src/pentesting-cloud/aws-security/aws-services/aws-dynamodb-enum.md index 1bd7eb438..f2c850ebb 100644 --- a/src/pentesting-cloud/aws-security/aws-services/aws-dynamodb-enum.md +++ b/src/pentesting-cloud/aws-security/aws-services/aws-dynamodb-enum.md @@ -56,25 +56,25 @@ aws dynamodb describe-endpoints #Dynamodb endpoints ### Ongeauthentiseerde Toegang {{#ref}} -../aws-unauthenticated-enum-access/aws-dynamodb-unauthenticated-access.md +../aws-unauthenticated-enum-access/aws-dynamodb-unauthenticated-access/README.md {{#endref}} ### Privilege Escalation {{#ref}} -../aws-privilege-escalation/aws-dynamodb-privesc.md +../aws-privilege-escalation/aws-dynamodb-privesc/README.md {{#endref}} ### Post Exploitatie {{#ref}} -../aws-post-exploitation/aws-dynamodb-post-exploitation.md +../aws-post-exploitation/aws-dynamodb-post-exploitation/README.md {{#endref}} ### Volharding {{#ref}} -../aws-persistence/aws-dynamodb-persistence.md +../aws-persistence/aws-dynamodb-persistence/README.md {{#endref}} ## DynamoDB Inspuiting diff --git a/src/pentesting-cloud/aws-security/aws-services/aws-ec2-ebs-elb-ssm-vpc-and-vpn-enum/README.md b/src/pentesting-cloud/aws-security/aws-services/aws-ec2-ebs-elb-ssm-vpc-and-vpn-enum/README.md index d730deb43..60185648a 100644 --- a/src/pentesting-cloud/aws-security/aws-services/aws-ec2-ebs-elb-ssm-vpc-and-vpn-enum/README.md +++ b/src/pentesting-cloud/aws-security/aws-services/aws-ec2-ebs-elb-ssm-vpc-and-vpn-enum/README.md @@ -130,7 +130,7 @@ aws ec2 describe-vpc-peering-connections ### Ongeauthentiseerde Toegang {{#ref}} -../../aws-unauthenticated-enum-access/aws-ec2-unauthenticated-enum.md +../../aws-unauthenticated-enum-access/aws-ec2-unauthenticated-enum/README.md {{#endref}} ### Privilege Escalation @@ -138,7 +138,7 @@ aws ec2 describe-vpc-peering-connections Op die volgende bladsy kan jy kyk hoe om **EC2-toestemmings te misbruik om voorregte te verhoog**: {{#ref}} -../../aws-privilege-escalation/aws-ec2-privesc.md +../../aws-privilege-escalation/aws-ec2-privesc/README.md {{#endref}} ### Post-Exploitation @@ -162,7 +162,7 @@ Snapshots kan **sensitiewe inligting** soos **bronkode of API sleutels** bevat, Op die volgende bladsy kan jy kyk hoe om **EBS-toestemmings te misbruik om voorregte te verhoog**: {{#ref}} -../../aws-privilege-escalation/aws-ebs-privesc.md +../../aws-privilege-escalation/aws-ebs-privesc/README.md {{#endref}} ## SSM @@ -191,7 +191,7 @@ ps aux | grep amazon-ssm In die volgende bladsy kan jy kyk hoe om **SSM-toestemmings te misbruik om voorregte te eskaleer**: {{#ref}} -../../aws-privilege-escalation/aws-ssm-privesc.md +../../aws-privilege-escalation/aws-ssm-privesc/README.md {{#endref}} ### Persistensie @@ -199,7 +199,7 @@ In die volgende bladsy kan jy kyk hoe om **SSM-toestemmings te misbruik om voorr In die volgende bladsy kan jy kyk hoe om **SSM-toestemmings te misbruik om persistensie te bereik**: {{#ref}} -../../aws-persistence/aws-ssm-persistence.md +../../aws-persistence/aws-ssm-persistence/README.md {{#endref}} ## ELB @@ -312,7 +312,7 @@ As 'n **VPN-verbinding gevestig is**, moet jy soek na **`.opvn`** konfigurasie l #### **NĂ¡ Exploitatie** {{#ref}} -../../aws-post-exploitation/aws-vpn-post-exploitation.md +../../aws-post-exploitation/aws-vpn-post-exploitation/README.md {{#endref}} ## Verwysings diff --git a/src/pentesting-cloud/aws-security/aws-services/aws-ecr-enum.md b/src/pentesting-cloud/aws-security/aws-services/aws-ecr-enum.md index 47c61451e..ee086e09c 100644 --- a/src/pentesting-cloud/aws-security/aws-services/aws-ecr-enum.md +++ b/src/pentesting-cloud/aws-security/aws-services/aws-ecr-enum.md @@ -68,7 +68,7 @@ aws ecr get-repository-policy --repository-name ### Ongeauthentiseerde Enum {{#ref}} -../aws-unauthenticated-enum-access/aws-ecr-unauthenticated-enum.md +../aws-unauthenticated-enum-access/aws-ecr-unauthenticated-enum/README.md {{#endref}} ### Privesc @@ -76,19 +76,19 @@ aws ecr get-repository-policy --repository-name In die volgende bladsy kan jy kyk hoe om **ECR-toestemmings te misbruik om voorregte te verhoog**: {{#ref}} -../aws-privilege-escalation/aws-ecr-privesc.md +../aws-privilege-escalation/aws-ecr-privesc/README.md {{#endref}} ### Post Exploitatie {{#ref}} -../aws-post-exploitation/aws-ecr-post-exploitation.md +../aws-post-exploitation/aws-ecr-post-exploitation/README.md {{#endref}} ### Volharding {{#ref}} -../aws-persistence/aws-ecr-persistence.md +../aws-persistence/aws-ecr-persistence/README.md {{#endref}} ## Verwysings diff --git a/src/pentesting-cloud/aws-security/aws-services/aws-ecs-enum.md b/src/pentesting-cloud/aws-security/aws-services/aws-ecs-enum.md index e5ebbbd47..8059825e8 100644 --- a/src/pentesting-cloud/aws-security/aws-services/aws-ecs-enum.md +++ b/src/pentesting-cloud/aws-security/aws-services/aws-ecs-enum.md @@ -54,7 +54,7 @@ aws ecs describe-task-definition --task-definition : ### Ongeauthentiseerde Toegang {{#ref}} -../aws-unauthenticated-enum-access/aws-ecs-unauthenticated-enum.md +../aws-unauthenticated-enum-access/aws-ecs-unauthenticated-enum/README.md {{#endref}} ### Privilege Escalation @@ -62,19 +62,19 @@ aws ecs describe-task-definition --task-definition : In die volgende bladsy kan jy kyk hoe om **ECS-toestemmings te misbruik om voorregte te verhoog**: {{#ref}} -../aws-privilege-escalation/aws-ecs-privesc.md +../aws-privilege-escalation/aws-ecs-privesc/README.md {{#endref}} ### Post Exploitatie {{#ref}} -../aws-post-exploitation/aws-ecs-post-exploitation.md +../aws-post-exploitation/aws-ecs-post-exploitation/README.md {{#endref}} ### Volharding {{#ref}} -../aws-persistence/aws-ecs-persistence.md +../aws-persistence/aws-ecs-persistence/README.md {{#endref}} {{#include ../../../banners/hacktricks-training.md}} diff --git a/src/pentesting-cloud/aws-security/aws-services/aws-efs-enum.md b/src/pentesting-cloud/aws-security/aws-services/aws-efs-enum.md index 377f098ba..99e3c6f33 100644 --- a/src/pentesting-cloud/aws-security/aws-services/aws-efs-enum.md +++ b/src/pentesting-cloud/aws-security/aws-services/aws-efs-enum.md @@ -214,19 +214,19 @@ get_efs_info(ip_address) ## Privesc {{#ref}} -../aws-privilege-escalation/aws-efs-privesc.md +../aws-privilege-escalation/aws-efs-privesc/README.md {{#endref}} ## Post Exploitation {{#ref}} -../aws-post-exploitation/aws-efs-post-exploitation.md +../aws-post-exploitation/aws-efs-post-exploitation/README.md {{#endref}} ## Persistensie {{#ref}} -../aws-persistence/aws-efs-persistence.md +../aws-persistence/aws-efs-persistence/README.md {{#endref}} {{#include ../../../banners/hacktricks-training.md}} diff --git a/src/pentesting-cloud/aws-security/aws-services/aws-eks-enum.md b/src/pentesting-cloud/aws-security/aws-services/aws-eks-enum.md index 2e4e67217..a5a633f1d 100644 --- a/src/pentesting-cloud/aws-security/aws-services/aws-eks-enum.md +++ b/src/pentesting-cloud/aws-security/aws-services/aws-eks-enum.md @@ -34,7 +34,7 @@ aws eks describe-update --name --update-id #### Post Exploitation {{#ref}} -../aws-post-exploitation/aws-eks-post-exploitation.md +../aws-post-exploitation/aws-eks-post-exploitation/README.md {{#endref}} ## Verwysings diff --git a/src/pentesting-cloud/aws-security/aws-services/aws-elastic-beanstalk-enum.md b/src/pentesting-cloud/aws-security/aws-services/aws-elastic-beanstalk-enum.md index 3f9fc95dc..e37ae3da6 100644 --- a/src/pentesting-cloud/aws-security/aws-services/aws-elastic-beanstalk-enum.md +++ b/src/pentesting-cloud/aws-security/aws-services/aws-elastic-beanstalk-enum.md @@ -87,25 +87,25 @@ aws elasticbeanstalk describe-events ### Ongeauthentiseerde Toegang {{#ref}} -../aws-unauthenticated-enum-access/aws-elastic-beanstalk-unauthenticated-enum.md +../aws-unauthenticated-enum-access/aws-elastic-beanstalk-unauthenticated-enum/README.md {{#endref}} ### Volharding {{#ref}} -../aws-persistence/aws-elastic-beanstalk-persistence.md +../aws-persistence/aws-elastic-beanstalk-persistence/README.md {{#endref}} ### Privilege Escalation {{#ref}} -../aws-privilege-escalation/aws-elastic-beanstalk-privesc.md +../aws-privilege-escalation/aws-elastic-beanstalk-privesc/README.md {{#endref}} ### Post Exploitatie {{#ref}} -../aws-post-exploitation/aws-elastic-beanstalk-post-exploitation.md +../aws-post-exploitation/aws-elastic-beanstalk-post-exploitation/README.md {{#endref}} {{#include ../../../banners/hacktricks-training.md}} diff --git a/src/pentesting-cloud/aws-security/aws-services/aws-emr-enum.md b/src/pentesting-cloud/aws-security/aws-services/aws-emr-enum.md index 4eda572b3..49db9fc80 100644 --- a/src/pentesting-cloud/aws-security/aws-services/aws-emr-enum.md +++ b/src/pentesting-cloud/aws-security/aws-services/aws-emr-enum.md @@ -48,7 +48,7 @@ aws emr list-studios #Get studio URLs #### Privesc {{#ref}} -../aws-privilege-escalation/aws-emr-privesc.md +../aws-privilege-escalation/aws-emr-privesc/README.md {{#endref}} ## Verwysings diff --git a/src/pentesting-cloud/aws-security/aws-services/aws-iam-enum.md b/src/pentesting-cloud/aws-security/aws-services/aws-iam-enum.md index ee7290428..d63f56c2a 100644 --- a/src/pentesting-cloud/aws-security/aws-services/aws-iam-enum.md +++ b/src/pentesting-cloud/aws-security/aws-services/aws-iam-enum.md @@ -213,7 +213,7 @@ Geen van die vorige gereedskap is in staat om naby al die toestemmings te kontro ### Ongeauthentiseerde Toegang {{#ref}} -../aws-unauthenticated-enum-access/aws-iam-and-sts-unauthenticated-enum.md +../aws-unauthenticated-enum-access/aws-iam-and-sts-unauthenticated-enum/README.md {{#endref}} ### Privilege Escalation @@ -221,19 +221,19 @@ Geen van die vorige gereedskap is in staat om naby al die toestemmings te kontro Op die volgende bladsy kan jy kyk hoe om **IAM-toestemmings te misbruik om voorregte te verhoog**: {{#ref}} -../aws-privilege-escalation/aws-iam-privesc.md +../aws-privilege-escalation/aws-iam-privesc/README.md {{#endref}} ### IAM Post Exploitation {{#ref}} -../aws-post-exploitation/aws-iam-post-exploitation.md +../aws-post-exploitation/aws-iam-post-exploitation/README.md {{#endref}} ### IAM Persistence {{#ref}} -../aws-persistence/aws-iam-persistence.md +../aws-persistence/aws-iam-persistence/README.md {{#endref}} ## IAM Identiteitsentrum @@ -340,19 +340,19 @@ external_id = 123456 ### Ongeauthentiseerde Toegang {{#ref}} -../aws-unauthenticated-enum-access/aws-identity-center-and-sso-unauthenticated-enum.md +../aws-unauthenticated-enum-access/aws-identity-center-and-sso-unauthenticated-enum/README.md {{#endref}} ### Privilege Escalation {{#ref}} -../aws-privilege-escalation/aws-sso-and-identitystore-privesc.md +../aws-privilege-escalation/aws-sso-and-identitystore-privesc/README.md {{#endref}} ### Post Exploitation {{#ref}} -../aws-post-exploitation/aws-sso-and-identitystore-post-exploitation.md +../aws-post-exploitation/aws-sso-and-identitystore-post-exploitation/README.md {{#endref}} ### Volharding diff --git a/src/pentesting-cloud/aws-security/aws-services/aws-kms-enum.md b/src/pentesting-cloud/aws-security/aws-services/aws-kms-enum.md index f44ca7908..a40db160a 100644 --- a/src/pentesting-cloud/aws-security/aws-services/aws-kms-enum.md +++ b/src/pentesting-cloud/aws-security/aws-services/aws-kms-enum.md @@ -137,19 +137,19 @@ done ### Privesc {{#ref}} -../aws-privilege-escalation/aws-kms-privesc.md +../aws-privilege-escalation/aws-kms-privesc/README.md {{#endref}} ### Post Exploitation {{#ref}} -../aws-post-exploitation/aws-kms-post-exploitation.md +../aws-post-exploitation/aws-kms-post-exploitation/README.md {{#endref}} ### Persistence {{#ref}} -../aws-persistence/aws-kms-persistence.md +../aws-persistence/aws-kms-persistence/README.md {{#endref}} ## Verwysings diff --git a/src/pentesting-cloud/aws-security/aws-services/aws-lambda-enum.md b/src/pentesting-cloud/aws-security/aws-services/aws-lambda-enum.md index b10972380..b56f857a5 100644 --- a/src/pentesting-cloud/aws-security/aws-services/aws-lambda-enum.md +++ b/src/pentesting-cloud/aws-security/aws-services/aws-lambda-enum.md @@ -143,13 +143,13 @@ Daar is baie ander bronne wat 'n lambda kan aktiveer Op die volgende bladsy kan jy kyk hoe om **Lambda-toestemmings te misbruik om voorregte te verhoog**: {{#ref}} -../aws-privilege-escalation/aws-lambda-privesc.md +../aws-privilege-escalation/aws-lambda-privesc/README.md {{#endref}} ### Ongeauthentiseerde Toegang {{#ref}} -../aws-unauthenticated-enum-access/aws-lambda-unauthenticated-access.md +../aws-unauthenticated-enum-access/aws-lambda-unauthenticated-access/README.md {{#endref}} ### Post Exploitatie diff --git a/src/pentesting-cloud/aws-security/aws-services/aws-lightsail-enum.md b/src/pentesting-cloud/aws-security/aws-services/aws-lightsail-enum.md index a99e0dc0d..d9113db29 100644 --- a/src/pentesting-cloud/aws-security/aws-services/aws-lightsail-enum.md +++ b/src/pentesting-cloud/aws-security/aws-services/aws-lightsail-enum.md @@ -39,19 +39,19 @@ Dit is moontlik om **instansie en relationele databasis snapshots van lightsail* ### Privesc {{#ref}} -../aws-privilege-escalation/aws-lightsail-privesc.md +../aws-privilege-escalation/aws-lightsail-privesc/README.md {{#endref}} ### Post Exploitation {{#ref}} -../aws-post-exploitation/aws-lightsail-post-exploitation.md +../aws-post-exploitation/aws-lightsail-post-exploitation/README.md {{#endref}} ### Persistensie {{#ref}} -../aws-persistence/aws-lightsail-persistence.md +../aws-persistence/aws-lightsail-persistence/README.md {{#endref}} {{#include ../../../banners/hacktricks-training.md}} diff --git a/src/pentesting-cloud/aws-security/aws-services/aws-macie-enum.md b/src/pentesting-cloud/aws-security/aws-services/aws-macie-enum.md index 454499ae0..259468156 100644 --- a/src/pentesting-cloud/aws-security/aws-services/aws-macie-enum.md +++ b/src/pentesting-cloud/aws-security/aws-services/aws-macie-enum.md @@ -123,7 +123,7 @@ aws macie2 get-usage-statistic ### Privesc {{#ref}} -../aws-privilege-escalation/aws-macie-privesc.md +../aws-privilege-escalation/aws-macie-privesc/README.md {{#endref}} ### Post Exploitation diff --git a/src/pentesting-cloud/aws-security/aws-services/aws-mq-enum.md b/src/pentesting-cloud/aws-security/aws-services/aws-mq-enum.md index 3743823af..88f6ad0db 100644 --- a/src/pentesting-cloud/aws-security/aws-services/aws-mq-enum.md +++ b/src/pentesting-cloud/aws-security/aws-services/aws-mq-enum.md @@ -53,13 +53,13 @@ aws mq create-user --broker-id --password --username --c ## Privesc {{#ref}} -../aws-privilege-escalation/aws-mq-privesc.md +../aws-privilege-escalation/aws-mq-privesc/README.md {{#endref}} ## Unauthenticated Access {{#ref}} -../aws-unauthenticated-enum-access/aws-mq-unauthenticated-enum.md +../aws-unauthenticated-enum-access/aws-mq-unauthenticated-enum/README.md {{#endref}} ## Persistence diff --git a/src/pentesting-cloud/aws-security/aws-services/aws-msk-enum.md b/src/pentesting-cloud/aws-security/aws-services/aws-msk-enum.md index 54913e874..4299fb06e 100644 --- a/src/pentesting-cloud/aws-security/aws-services/aws-msk-enum.md +++ b/src/pentesting-cloud/aws-security/aws-services/aws-msk-enum.md @@ -75,13 +75,13 @@ kafka_2.12-2.8.1/bin/kafka-console-consumer.sh --bootstrap-server $BS --consumer ### Privesc {{#ref}} -../aws-privilege-escalation/aws-msk-privesc.md +../aws-privilege-escalation/aws-msk-privesc/README.md {{#endref}} ### Unauthenticated Access {{#ref}} -../aws-unauthenticated-enum-access/aws-msk-unauthenticated-enum.md +../aws-unauthenticated-enum-access/aws-msk-unauthenticated-enum/README.md {{#endref}} ### Persistence diff --git a/src/pentesting-cloud/aws-security/aws-services/aws-redshift-enum.md b/src/pentesting-cloud/aws-security/aws-services/aws-redshift-enum.md index 3d3e9c5a9..995b3ff6c 100644 --- a/src/pentesting-cloud/aws-security/aws-services/aws-redshift-enum.md +++ b/src/pentesting-cloud/aws-security/aws-services/aws-redshift-enum.md @@ -84,7 +84,7 @@ psql -h redshift-cluster-1.sdflju3jdfkfg.us-east-1.redshift.amazonaws.com -U adm ## Privesc {{#ref}} -../aws-privilege-escalation/aws-redshift-privesc.md +../aws-privilege-escalation/aws-redshift-privesc/README.md {{#endref}} ## Volharding diff --git a/src/pentesting-cloud/aws-security/aws-services/aws-relational-database-rds-enum.md b/src/pentesting-cloud/aws-security/aws-services/aws-relational-database-rds-enum.md index 93bfd0ac2..ff475c327 100644 --- a/src/pentesting-cloud/aws-security/aws-services/aws-relational-database-rds-enum.md +++ b/src/pentesting-cloud/aws-security/aws-services/aws-relational-database-rds-enum.md @@ -108,25 +108,25 @@ aws rds modify-db-instance --db-instance-identifier --master-user-password ### Ongeauthentiseerde Toegang {{#ref}} -../aws-unauthenticated-enum-access/aws-rds-unauthenticated-enum.md +../aws-unauthenticated-enum-access/aws-rds-unauthenticated-enum/README.md {{#endref}} ### Privilege Escalation {{#ref}} -../aws-privilege-escalation/aws-rds-privesc.md +../aws-privilege-escalation/aws-rds-privesc/README.md {{#endref}} ### Post Exploitatie {{#ref}} -../aws-post-exploitation/aws-rds-post-exploitation.md +../aws-post-exploitation/aws-rds-post-exploitation/README.md {{#endref}} ### Volharding {{#ref}} -../aws-persistence/aws-rds-persistence.md +../aws-persistence/aws-rds-persistence/README.md {{#endref}} ### SQL Inbraak diff --git a/src/pentesting-cloud/aws-security/aws-services/aws-route53-enum.md b/src/pentesting-cloud/aws-security/aws-services/aws-route53-enum.md index 020cac016..49acc896a 100644 --- a/src/pentesting-cloud/aws-security/aws-services/aws-route53-enum.md +++ b/src/pentesting-cloud/aws-security/aws-services/aws-route53-enum.md @@ -23,7 +23,7 @@ aws route53 list-traffic-policies ### Privesc {{#ref}} -../aws-privilege-escalation/route53-createhostedzone-route53-changeresourcerecordsets-acm-pca-issuecertificate-acm-pca-getcer.md +../aws-privilege-escalation/route53-createhostedzone-route53-changeresourcerecordsets-acm-pca-issuecertificate-acm-pca-getcer/README.md {{#endref}} {{#include ../../../banners/hacktricks-training.md}} diff --git a/src/pentesting-cloud/aws-security/aws-services/aws-s3-athena-and-glacier-enum.md b/src/pentesting-cloud/aws-security/aws-services/aws-s3-athena-and-glacier-enum.md index de312bf0f..af59da265 100644 --- a/src/pentesting-cloud/aws-security/aws-services/aws-s3-athena-and-glacier-enum.md +++ b/src/pentesting-cloud/aws-security/aws-services/aws-s3-athena-and-glacier-enum.md @@ -241,25 +241,25 @@ Dual-stack eindpunte gebruik die volgende sintaksis: In die volgende bladsy kan jy kyk hoe om **S3-toestemmings te misbruik om voorregte te verhoog**: {{#ref}} -../aws-privilege-escalation/aws-s3-privesc.md +../aws-privilege-escalation/aws-s3-privesc/README.md {{#endref}} ### Unauthenticated Access {{#ref}} -../aws-unauthenticated-enum-access/aws-s3-unauthenticated-enum.md +../aws-unauthenticated-enum-access/aws-s3-unauthenticated-enum/README.md {{#endref}} ### S3 Post Exploitation {{#ref}} -../aws-post-exploitation/aws-s3-post-exploitation.md +../aws-post-exploitation/aws-s3-post-exploitation/README.md {{#endref}} ### Persistence {{#ref}} -../aws-persistence/aws-s3-persistence.md +../aws-persistence/aws-s3-persistence/README.md {{#endref}} ## Other S3 vulns diff --git a/src/pentesting-cloud/aws-security/aws-services/aws-secrets-manager-enum.md b/src/pentesting-cloud/aws-security/aws-services/aws-secrets-manager-enum.md index 4ecec723b..301f3fa98 100644 --- a/src/pentesting-cloud/aws-security/aws-services/aws-secrets-manager-enum.md +++ b/src/pentesting-cloud/aws-security/aws-services/aws-secrets-manager-enum.md @@ -30,19 +30,19 @@ aws secretsmanager get-resource-policy --secret-id --secret-id ### Privesc {{#ref}} -../aws-privilege-escalation/aws-secrets-manager-privesc.md +../aws-privilege-escalation/aws-secrets-manager-privesc/README.md {{#endref}} ### Post Exploitation {{#ref}} -../aws-post-exploitation/aws-secrets-manager-post-exploitation.md +../aws-post-exploitation/aws-secrets-manager-post-exploitation/README.md {{#endref}} ### Persistensie {{#ref}} -../aws-persistence/aws-secrets-manager-persistence.md +../aws-persistence/aws-secrets-manager-persistence/README.md {{#endref}} {{#include ../../../banners/hacktricks-training.md}} diff --git a/src/pentesting-cloud/aws-security/aws-services/aws-security-and-detection-services/aws-cloudtrail-enum.md b/src/pentesting-cloud/aws-security/aws-services/aws-security-and-detection-services/aws-cloudtrail-enum.md index 98ee8d1f7..1a9090f24 100644 --- a/src/pentesting-cloud/aws-security/aws-services/aws-security-and-detection-services/aws-cloudtrail-enum.md +++ b/src/pentesting-cloud/aws-security/aws-services/aws-security-and-detection-services/aws-cloudtrail-enum.md @@ -211,7 +211,7 @@ Daarom kan 'n gebruiker met toegang tot EKS wat die URL van die EKS API ontdek h Meer inligting in: {{#ref}} -../../aws-post-exploitation/aws-eks-post-exploitation.md +../../aws-post-exploitation/aws-eks-post-exploitation/README.md {{#endref}} ### Wysig CloudTrail Konfigurasie @@ -259,7 +259,7 @@ Jy kan **'n asimmetriese sleutel genereer** en **CloudTrail die data met daardie Dit is basies **S3-KMS ransomware** wat verduidelik word in: {{#ref}} -../../aws-post-exploitation/aws-s3-post-exploitation.md +../../aws-post-exploitation/aws-s3-post-exploitation/README.md {{#endref}} **KMS ransomware** @@ -267,7 +267,7 @@ Dit is basies **S3-KMS ransomware** wat verduidelik word in: Dit is 'n maklike manier om die vorige aanval met verskillende toestemmingsvereistes uit te voer: {{#ref}} -../../aws-post-exploitation/aws-kms-post-exploitation.md +../../aws-post-exploitation/aws-kms-post-exploitation/README.md {{#endref}} ## **Verwysings** diff --git a/src/pentesting-cloud/aws-security/aws-services/aws-security-and-detection-services/aws-control-tower-enum.md b/src/pentesting-cloud/aws-security/aws-services/aws-security-and-detection-services/aws-control-tower-enum.md index 7ca8eac7c..f4b0747cd 100644 --- a/src/pentesting-cloud/aws-security/aws-services/aws-security-and-detection-services/aws-control-tower-enum.md +++ b/src/pentesting-cloud/aws-security/aws-services/aws-security-and-detection-services/aws-control-tower-enum.md @@ -34,7 +34,7 @@ aws controltower list-enabled-controls --target-identifier arn:aws:organizations ### Post Exploitation & Persistence {{#ref}} -../../aws-post-exploitation/aws-control-tower-post-exploitation.md +../../aws-post-exploitation/aws-control-tower-post-exploitation/README.md {{#endref}} {{#include ../../../../banners/hacktricks-training.md}} diff --git a/src/pentesting-cloud/aws-security/aws-services/aws-ses-enum.md b/src/pentesting-cloud/aws-security/aws-services/aws-ses-enum.md index a8d9dfeb4..f66279a0e 100644 --- a/src/pentesting-cloud/aws-security/aws-services/aws-ses-enum.md +++ b/src/pentesting-cloud/aws-security/aws-services/aws-ses-enum.md @@ -115,7 +115,7 @@ aws ses get-send-statistics ### Post Exploitation {{#ref}} -../aws-post-exploitation/aws-ses-post-exploitation.md +../aws-post-exploitation/aws-ses-post-exploitation/README.md {{#endref}} {{#include ../../../banners/hacktricks-training.md}} diff --git a/src/pentesting-cloud/aws-security/aws-services/aws-sns-enum.md b/src/pentesting-cloud/aws-security/aws-services/aws-sns-enum.md index 703cae61b..b6edab704 100644 --- a/src/pentesting-cloud/aws-security/aws-services/aws-sns-enum.md +++ b/src/pentesting-cloud/aws-security/aws-services/aws-sns-enum.md @@ -49,25 +49,25 @@ aws sns subscribe --region \ #### Unauthenticated Access {{#ref}} -../aws-unauthenticated-enum-access/aws-sns-unauthenticated-enum.md +../aws-unauthenticated-enum-access/aws-sns-unauthenticated-enum/README.md {{#endref}} #### Privilege Escalation {{#ref}} -../aws-privilege-escalation/aws-sns-privesc.md +../aws-privilege-escalation/aws-sns-privesc/README.md {{#endref}} #### Post Exploitation {{#ref}} -../aws-post-exploitation/aws-sns-post-exploitation.md +../aws-post-exploitation/aws-sns-post-exploitation/README.md {{#endref}} #### Persistence {{#ref}} -../aws-persistence/aws-sns-persistence.md +../aws-persistence/aws-sns-persistence/README.md {{#endref}} ## References diff --git a/src/pentesting-cloud/aws-security/aws-services/aws-sqs-and-sns-enum.md b/src/pentesting-cloud/aws-security/aws-services/aws-sqs-and-sns-enum.md index b67ba04ca..42932ca0c 100644 --- a/src/pentesting-cloud/aws-security/aws-services/aws-sqs-and-sns-enum.md +++ b/src/pentesting-cloud/aws-security/aws-services/aws-sqs-and-sns-enum.md @@ -23,25 +23,25 @@ aws sqs send-message --queue-url --message-body #### Unauthenticated Access {{#ref}} -../aws-unauthenticated-enum-access/aws-sqs-unauthenticated-enum.md +../aws-unauthenticated-enum-access/aws-sqs-unauthenticated-enum/README.md {{#endref}} #### Privilege Escalation {{#ref}} -../aws-privilege-escalation/aws-sqs-privesc.md +../aws-privilege-escalation/aws-sqs-privesc/README.md {{#endref}} #### Post Exploitation {{#ref}} -../aws-post-exploitation/aws-sqs-post-exploitation.md +../aws-post-exploitation/aws-sqs-post-exploitation/README.md {{#endref}} #### Persistence {{#ref}} -../aws-persistence/aws-sqs-persistence.md +../aws-persistence/aws-sqs-persistence/README.md {{#endref}} ## References diff --git a/src/pentesting-cloud/aws-security/aws-services/aws-stepfunctions-enum.md b/src/pentesting-cloud/aws-security/aws-services/aws-stepfunctions-enum.md index 451158657..b0f353692 100644 --- a/src/pentesting-cloud/aws-security/aws-services/aws-stepfunctions-enum.md +++ b/src/pentesting-cloud/aws-security/aws-services/aws-stepfunctions-enum.md @@ -302,19 +302,19 @@ aws stepfunctions list-executions --map-run-arn [--status-filter --token-code In die volgende bladsy kan jy kyk hoe om **STS-toestemmings te misbruik om voorregte te verhoog**: {{#ref}} -../aws-privilege-escalation/aws-sts-privesc.md +../aws-privilege-escalation/aws-sts-privesc/README.md {{#endref}} ### Post Exploitation {{#ref}} -../aws-post-exploitation/aws-sts-post-exploitation.md +../aws-post-exploitation/aws-sts-post-exploitation/README.md {{#endref}} ### Persistence {{#ref}} -../aws-persistence/aws-sts-persistence.md +../aws-persistence/aws-sts-persistence/README.md {{#endref}} ## References diff --git a/src/pentesting-cloud/aws-security/aws-services/eventbridgescheduler-enum.md b/src/pentesting-cloud/aws-security/aws-services/eventbridgescheduler-enum.md index e2bec08bb..2e902b170 100644 --- a/src/pentesting-cloud/aws-security/aws-services/eventbridgescheduler-enum.md +++ b/src/pentesting-cloud/aws-security/aws-services/eventbridgescheduler-enum.md @@ -67,7 +67,7 @@ aws scheduler list-tags-for-resource --resource-arn In die volgende bladsy kan jy kyk hoe om **eventbridge scheduler toestemming te misbruik om voorregte te verhoog**: {{#ref}} -../aws-privilege-escalation/eventbridgescheduler-privesc.md +../aws-privilege-escalation/eventbridgescheduler-privesc/README.md {{#endref}} ## References