trasnlate other half

This commit is contained in:
Carlos Polop
2024-12-31 18:48:54 +01:00
parent 4d622f5500
commit d96df379fd
245 changed files with 406 additions and 0 deletions

View File

@@ -148,3 +148,5 @@ aws apigateway create-usage-plan-key --usage-plan-id $USAGE_PLAN --key-id $API_K

View File

@@ -33,3 +33,5 @@ You can check the [**tf code to recreate this scenarios here**](https://github.c

View File

@@ -86,3 +86,5 @@ aws codebuild delete-source-credentials --arn <value>

View File

@@ -190,3 +190,5 @@ aws codebuild start-build --project-name <proj-name>

View File

@@ -22,3 +22,5 @@ aws controltower enable-control --control-identifier <arn_control_id> --target-i

View File

@@ -97,3 +97,5 @@ A template for the policy document can be seen here:

View File

@@ -351,3 +351,5 @@ bashCopy codeaws dynamodbstreams get-records \

View File

@@ -143,3 +143,5 @@ You can use this tool to automate the attack: [https://github.com/Static-Flow/Cl

View File

@@ -17,3 +17,5 @@ For more information and access to the [**malmirror script**](https://github.com

View File

@@ -98,3 +98,5 @@ aws ecr-public batch-delete-image --repository-name your-ecr-repo-name --image-i

View File

@@ -65,3 +65,5 @@ The EC2 instance will probably also have the permission `ecr:GetAuthorizationTok

View File

@@ -56,3 +56,5 @@ aws efs delete-access-point --access-point-id <value>

View File

@@ -157,3 +157,5 @@ So, if an **attacker compromises a cluster using fargate** and **removes all the

View File

@@ -82,3 +82,5 @@ aws elasticbeanstalk remove-tags --resource-arn arn:aws:elasticbeanstalk:us-west

View File

@@ -105,3 +105,5 @@ A common way to avoid Confused Deputy problems is the use of a condition with `A

View File

@@ -135,3 +135,5 @@ aws kms schedule-key-deletion \

View File

@@ -31,3 +31,5 @@ Abusing Lambda Layers it's also possible to abuse extensions and persist in the

View File

@@ -65,3 +65,5 @@ For more info check [https://github.com/carlospolop/lambda_bootstrap_switcher](h

View File

@@ -32,3 +32,5 @@ Check out the Lightsail privesc options to learn different ways to access potent

View File

@@ -21,3 +21,5 @@ aws organizations deregister-account --account-id <account_id> --region <region>

View File

@@ -94,3 +94,5 @@ aws rds start-export-task --export-task-identifier attacker-export-task --source

View File

@@ -40,3 +40,5 @@ Finally, the attacker could upload a final file, usually named "ransom-note.txt,

View File

@@ -51,3 +51,5 @@ aws secretsmanager delete-secret \

View File

@@ -82,3 +82,5 @@ aws sns untag-resource --resource-arn <value> --tag-keys <key>

View File

@@ -89,3 +89,5 @@ arduinoCopy codeaws sqs remove-permission --queue-url <value> --label <value>

View File

@@ -27,3 +27,5 @@ aws sso-admin delete-account-assignment --instance-arn <SSOInstanceARN> --target

View File

@@ -76,3 +76,5 @@ aws stepfunctions untag-resource --resource-arn <value> --tag-keys <key>

View File

@@ -106,3 +106,5 @@ response = client.get_secret_value(SecretId="flag_secret") print(response['Secre