From 9947d24ca4235ef088c90fc702b61d685c296d87 Mon Sep 17 00:00:00 2001 From: Translator Date: Tue, 7 Oct 2025 15:30:06 +0000 Subject: [PATCH] Fix unmatched refs --- .../aws-lambda-post-exploitation/README.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/src/pentesting-cloud/aws-security/aws-post-exploitation/aws-lambda-post-exploitation/README.md b/src/pentesting-cloud/aws-security/aws-post-exploitation/aws-lambda-post-exploitation/README.md index 15e3e0c57..2cc04b044 100644 --- a/src/pentesting-cloud/aws-security/aws-post-exploitation/aws-lambda-post-exploitation/README.md +++ b/src/pentesting-cloud/aws-security/aws-post-exploitation/aws-lambda-post-exploitation/README.md @@ -69,7 +69,7 @@ aws-lambda-function-url-public-exposure.md 滥用 `UpdateEventSourceMapping` 更改现有 Event Source Mapping (ESM) 的目标 Lambda 函数,使来自 DynamoDB Streams、Kinesis 或 SQS 的记录被投递到攻击者控制的函数。这样可以在不接触生产者或原函数代码的情况下,悄然转移实时数据。 {{#ref}} -aws-lambda-event-source-mapping-target-hijack.md +aws-lambda-event-source-mapping-hijack.md {{#endref}} ### AWS Lambda – EFS Mount Injection data exfiltration