trasnlate other half

This commit is contained in:
Carlos Polop
2024-12-31 18:48:54 +01:00
parent 4d622f5500
commit d96df379fd
245 changed files with 406 additions and 0 deletions

View File

@@ -56,3 +56,5 @@ Other services found vulnerable:

View File

@@ -47,3 +47,5 @@ Many AWS error messages (even access denied) will give that information.

View File

@@ -58,3 +58,5 @@ You can find more information in the [**original research**](https://blog.plerio

View File

@@ -37,3 +37,5 @@ This new relationship between Github Actions and AWS creates another way to comp

View File

@@ -50,3 +50,5 @@ Pacu (new:test) > run cognito__enum

View File

@@ -17,3 +17,5 @@ Apart from giving access to all AWS or some compromised external AWS account, or

View File

@@ -62,3 +62,5 @@ aws ec2 describe-instances --query "Reservations[].Instances[?PublicIpAddress!=n

View File

@@ -36,3 +36,5 @@ crane ls <PRIVATE_REGISTRY_URL> | sed 's/ .*//'

View File

@@ -27,3 +27,5 @@ aws elbv2 describe-load-balancers --query 'LoadBalancers[?Scheme == `internet-fa

View File

@@ -39,3 +39,5 @@ aws elasticbeanstalk describe-environments --query 'Environments[?OptionSettings

View File

@@ -14,3 +14,5 @@ https://search-{user_provided}-[random].[region].es.amazonaws.com

View File

@@ -178,3 +178,5 @@ Note that **wildcard** (\*) before the **colon** (:). You can create an org such

View File

@@ -133,3 +133,5 @@ For more info about this [**check this post**](https://mjg59.dreamwidth.org/6217

View File

@@ -15,3 +15,5 @@ https://{random_id}.iot.{region}.amazonaws.com:443

View File

@@ -13,3 +13,5 @@ https://{random_id}.kinesisvideo.{region}.amazonaws.com

View File

@@ -24,3 +24,5 @@ You can find more information in the [**original research**](https://blog.plerio

View File

@@ -15,3 +15,5 @@ https://{random_id}.data.mediastore.{region}.amazonaws.com

View File

@@ -24,3 +24,5 @@ ssl://b-{random_id}-{1,2}.mq.{region}.amazonaws.com:61617

View File

@@ -20,3 +20,5 @@ b-{1,2,3,4}.{user_provided}.{random_id}.c{1,2}.kafka.{region}.amazonaws.com

View File

@@ -46,3 +46,5 @@ postgres://{user_provided}.{random_id}.{region}.rds.amazonaws.com:5432

View File

@@ -23,3 +23,5 @@ So if you **find the ARN of topics** inside the account (or brute forcing potent

View File

@@ -25,3 +25,5 @@ It's possible to misconfigure a SQS queue policy and grant permissions to everyo