From ec727e125952b999e313fa12ddc84f5ab2ce83b4 Mon Sep 17 00:00:00 2001 From: Translator Date: Thu, 9 Oct 2025 10:28:35 +0000 Subject: [PATCH] Fix unmatched refs --- .../aws-codebuild-post-exploitation/README.md | 2 +- .../aws-services/aws-api-gateway-enum.md | 8 ++++---- .../aws-cloudformation-and-codestar-enum.md | 2 +- .../aws-services/aws-cloudfront-enum.md | 4 ++-- .../aws-services/aws-codebuild-enum.md | 4 ++-- .../aws-services/aws-cognito-enum/README.md | 6 +++--- ...peline-codepipeline-codebuild-and-codecommit.md | 4 ++-- .../aws-directory-services-workdocs-enum.md | 4 ++-- .../aws-security/aws-services/aws-dynamodb-enum.md | 8 ++++---- .../aws-ec2-ebs-elb-ssm-vpc-and-vpn-enum/README.md | 12 ++++++------ .../aws-security/aws-services/aws-ecr-enum.md | 8 ++++---- .../aws-security/aws-services/aws-ecs-enum.md | 8 ++++---- .../aws-security/aws-services/aws-efs-enum.md | 6 +++--- .../aws-security/aws-services/aws-eks-enum.md | 2 +- .../aws-services/aws-elastic-beanstalk-enum.md | 8 ++++---- .../aws-security/aws-services/aws-emr-enum.md | 2 +- .../aws-security/aws-services/aws-iam-enum.md | 14 +++++++------- .../aws-security/aws-services/aws-kms-enum.md | 6 +++--- .../aws-security/aws-services/aws-lambda-enum.md | 4 ++-- .../aws-services/aws-lightsail-enum.md | 6 +++--- .../aws-security/aws-services/aws-macie-enum.md | 2 +- .../aws-security/aws-services/aws-mq-enum.md | 4 ++-- .../aws-security/aws-services/aws-msk-enum.md | 4 ++-- .../aws-security/aws-services/aws-redshift-enum.md | 2 +- .../aws-relational-database-rds-enum.md | 8 ++++---- .../aws-security/aws-services/aws-route53-enum.md | 2 +- .../aws-services/aws-s3-athena-and-glacier-enum.md | 8 ++++---- .../aws-services/aws-secrets-manager-enum.md | 6 +++--- .../aws-cloudtrail-enum.md | 6 +++--- .../aws-control-tower-enum.md | 2 +- .../aws-security/aws-services/aws-ses-enum.md | 2 +- .../aws-security/aws-services/aws-sns-enum.md | 8 ++++---- .../aws-services/aws-sqs-and-sns-enum.md | 8 ++++---- .../aws-services/aws-stepfunctions-enum.md | 6 +++--- .../aws-security/aws-services/aws-sts-enum.md | 6 +++--- .../aws-services/eventbridgescheduler-enum.md | 2 +- 36 files changed, 97 insertions(+), 97 deletions(-) diff --git a/src/pentesting-cloud/aws-security/aws-post-exploitation/aws-codebuild-post-exploitation/README.md b/src/pentesting-cloud/aws-security/aws-post-exploitation/aws-codebuild-post-exploitation/README.md index 8a7e20945..2f54748af 100644 --- a/src/pentesting-cloud/aws-security/aws-post-exploitation/aws-codebuild-post-exploitation/README.md +++ b/src/pentesting-cloud/aws-security/aws-post-exploitation/aws-codebuild-post-exploitation/README.md @@ -16,7 +16,7 @@ इसलिए, यदि आपके पास सीक्रेट मैनेजर को पढ़ने का एक्सेस है, तो आप इन सीक्रेट्स को प्राप्त कर सकते हैं और जुड़े प्लेटफॉर्म पर पिवट कर सकते हैं। {{#ref}} -../../aws-privilege-escalation/aws-secrets-manager-privesc.md +../../aws-privilege-escalation/aws-secrets-manager-privesc/README.md {{#endref}} ### Abuse CodeBuild Repo Access diff --git a/src/pentesting-cloud/aws-security/aws-services/aws-api-gateway-enum.md b/src/pentesting-cloud/aws-security/aws-services/aws-api-gateway-enum.md index 6e09f3ddf..2c1189a59 100644 --- a/src/pentesting-cloud/aws-security/aws-services/aws-api-gateway-enum.md +++ b/src/pentesting-cloud/aws-security/aws-services/aws-api-gateway-enum.md @@ -263,25 +263,25 @@ API कुंजी को काम करने के लिए, आपको ## अनधिकृत पहुंच {{#ref}} -../aws-unauthenticated-enum-access/aws-api-gateway-unauthenticated-enum.md +../aws-unauthenticated-enum-access/aws-api-gateway-unauthenticated-enum/README.md {{#endref}} ## Privesc {{#ref}} -../aws-privilege-escalation/aws-apigateway-privesc.md +../aws-privilege-escalation/aws-apigateway-privesc/README.md {{#endref}} ## Post Exploitation {{#ref}} -../aws-post-exploitation/aws-api-gateway-post-exploitation.md +../aws-post-exploitation/aws-api-gateway-post-exploitation/README.md {{#endref}} ## Persistence {{#ref}} -../aws-persistence/aws-api-gateway-persistence.md +../aws-persistence/aws-api-gateway-persistence/README.md {{#endref}} {{#include ../../../banners/hacktricks-training.md}} diff --git a/src/pentesting-cloud/aws-security/aws-services/aws-cloudformation-and-codestar-enum.md b/src/pentesting-cloud/aws-security/aws-services/aws-cloudformation-and-codestar-enum.md index ef96bdf48..5f4b2b715 100644 --- a/src/pentesting-cloud/aws-security/aws-services/aws-cloudformation-and-codestar-enum.md +++ b/src/pentesting-cloud/aws-security/aws-services/aws-cloudformation-and-codestar-enum.md @@ -40,7 +40,7 @@ In the following page you can check how to **cloudformation अनुमति ### Persistence {{#ref}} -../aws-persistence/aws-cloudformation-persistence.md +../aws-persistence/aws-cloudformation-persistence/README.md {{#endref}} ### Post-Exploitation diff --git a/src/pentesting-cloud/aws-security/aws-services/aws-cloudfront-enum.md b/src/pentesting-cloud/aws-security/aws-services/aws-cloudfront-enum.md index 4880e7d1d..0ee9a7232 100644 --- a/src/pentesting-cloud/aws-security/aws-services/aws-cloudfront-enum.md +++ b/src/pentesting-cloud/aws-security/aws-services/aws-cloudfront-enum.md @@ -30,13 +30,13 @@ aws cloudfront list-distributions | jq ".DistributionList.Items[] | .Id, .Origin ## बिना प्रमाणीकरण की पहुँच {{#ref}} -../aws-unauthenticated-enum-access/aws-cloudfront-unauthenticated-enum.md +../aws-unauthenticated-enum-access/aws-cloudfront-unauthenticated-enum/README.md {{#endref}} ## पोस्ट एक्सप्लोइटेशन {{#ref}} -../aws-post-exploitation/aws-cloudfront-post-exploitation.md +../aws-post-exploitation/aws-cloudfront-post-exploitation/README.md {{#endref}} {{#include ../../../banners/hacktricks-training.md}} diff --git a/src/pentesting-cloud/aws-security/aws-services/aws-codebuild-enum.md b/src/pentesting-cloud/aws-security/aws-services/aws-codebuild-enum.md index a715164fa..3e010d8ce 100644 --- a/src/pentesting-cloud/aws-security/aws-services/aws-codebuild-enum.md +++ b/src/pentesting-cloud/aws-security/aws-services/aws-codebuild-enum.md @@ -52,7 +52,7 @@ aws codebuild describe-test-cases --report-arn निम्नलिखित पृष्ठ पर, आप **कोडबिल्ड अनुमतियों का दुरुपयोग करके विशेषाधिकार बढ़ाने** के तरीके की जांच कर सकते हैं: {{#ref}} -../aws-privilege-escalation/aws-codebuild-privesc.md +../aws-privilege-escalation/aws-codebuild-privesc/README.md {{#endref}} ### Post Exploitation @@ -64,7 +64,7 @@ aws codebuild describe-test-cases --report-arn ### Unauthenticated Access {{#ref}} -../aws-unauthenticated-enum-access/aws-codebuild-unauthenticated-access.md +../aws-unauthenticated-enum-access/aws-codebuild-unauthenticated-access/README.md {{#endref}} ## References diff --git a/src/pentesting-cloud/aws-security/aws-services/aws-cognito-enum/README.md b/src/pentesting-cloud/aws-security/aws-services/aws-cognito-enum/README.md index d5e0e258a..32c4b78df 100644 --- a/src/pentesting-cloud/aws-security/aws-services/aws-cognito-enum/README.md +++ b/src/pentesting-cloud/aws-security/aws-services/aws-cognito-enum/README.md @@ -82,19 +82,19 @@ aws cognito-idp describe-risk-configuration --user-pool-id ## प्रिवेस्क {{#ref}} -../../aws-privilege-escalation/aws-cognito-privesc.md +../../aws-privilege-escalation/aws-cognito-privesc/README.md {{#endref}} ## अनधिकृत पहुंच {{#ref}} -../../aws-unauthenticated-enum-access/aws-cognito-unauthenticated-enum.md +../../aws-unauthenticated-enum-access/aws-cognito-unauthenticated-enum/README.md {{#endref}} ## स्थिरता {{#ref}} -../../aws-persistence/aws-cognito-persistence.md +../../aws-persistence/aws-cognito-persistence/README.md {{#endref}} {{#include ../../../../banners/hacktricks-training.md}} diff --git a/src/pentesting-cloud/aws-security/aws-services/aws-datapipeline-codepipeline-codebuild-and-codecommit.md b/src/pentesting-cloud/aws-security/aws-services/aws-datapipeline-codepipeline-codebuild-and-codecommit.md index d61f9b1bc..4a84c6567 100644 --- a/src/pentesting-cloud/aws-security/aws-services/aws-datapipeline-codepipeline-codebuild-and-codecommit.md +++ b/src/pentesting-cloud/aws-security/aws-services/aws-datapipeline-codepipeline-codebuild-and-codecommit.md @@ -28,7 +28,7 @@ aws datapipeline get-pipeline-definition --pipeline-id निम्नलिखित पृष्ठ पर आप **datapipeline अनुमतियों का दुरुपयोग करके विशेषाधिकार बढ़ाने** के तरीके की जांच कर सकते हैं: {{#ref}} -../aws-privilege-escalation/aws-datapipeline-privesc.md +../aws-privilege-escalation/aws-datapipeline-privesc/README.md {{#endref}} ## CodePipeline @@ -49,7 +49,7 @@ aws codepipeline get-pipeline-state --name In the following page you can check how to **abuse codepipeline permissions to escalate privileges**: {{#ref}} -../aws-privilege-escalation/aws-codepipeline-privesc.md +../aws-privilege-escalation/aws-codepipeline-privesc/README.md {{#endref}} ## CodeCommit diff --git a/src/pentesting-cloud/aws-security/aws-services/aws-directory-services-workdocs-enum.md b/src/pentesting-cloud/aws-security/aws-services/aws-directory-services-workdocs-enum.md index e2224b940..b8f1d6c36 100644 --- a/src/pentesting-cloud/aws-security/aws-services/aws-directory-services-workdocs-enum.md +++ b/src/pentesting-cloud/aws-security/aws-services/aws-directory-services-workdocs-enum.md @@ -48,7 +48,7 @@ aws ds describe-certificate --directory-id --certificate-id ### विशेषाधिकार वृद्धि {{#ref}} -../aws-privilege-escalation/aws-directory-services-privesc.md +../aws-privilege-escalation/aws-directory-services-privesc/README.md {{#endref}} ## स्थिरता @@ -109,7 +109,7 @@ aws workdocs add-resource-permissions --resource-id --principals Id=anonymo ### प्रिवेस्क {{#ref}} -../aws-privilege-escalation/aws-workdocs-privesc.md +../aws-privilege-escalation/aws-workdocs-privesc/README.md {{#endref}} {{#include ../../../banners/hacktricks-training.md}} diff --git a/src/pentesting-cloud/aws-security/aws-services/aws-dynamodb-enum.md b/src/pentesting-cloud/aws-security/aws-services/aws-dynamodb-enum.md index f957ee579..ecf9c8d56 100644 --- a/src/pentesting-cloud/aws-security/aws-services/aws-dynamodb-enum.md +++ b/src/pentesting-cloud/aws-security/aws-services/aws-dynamodb-enum.md @@ -56,25 +56,25 @@ aws dynamodb describe-endpoints #Dynamodb endpoints ### अनधिकृत पहुँच {{#ref}} -../aws-unauthenticated-enum-access/aws-dynamodb-unauthenticated-access.md +../aws-unauthenticated-enum-access/aws-dynamodb-unauthenticated-access/README.md {{#endref}} ### प्रिवेस्क {{#ref}} -../aws-privilege-escalation/aws-dynamodb-privesc.md +../aws-privilege-escalation/aws-dynamodb-privesc/README.md {{#endref}} ### पोस्ट एक्सप्लोइटेशन {{#ref}} -../aws-post-exploitation/aws-dynamodb-post-exploitation.md +../aws-post-exploitation/aws-dynamodb-post-exploitation/README.md {{#endref}} ### स्थिरता {{#ref}} -../aws-persistence/aws-dynamodb-persistence.md +../aws-persistence/aws-dynamodb-persistence/README.md {{#endref}} ## DynamoDB इंजेक्शन diff --git a/src/pentesting-cloud/aws-security/aws-services/aws-ec2-ebs-elb-ssm-vpc-and-vpn-enum/README.md b/src/pentesting-cloud/aws-security/aws-services/aws-ec2-ebs-elb-ssm-vpc-and-vpn-enum/README.md index dc66d81ca..f05b60f78 100644 --- a/src/pentesting-cloud/aws-security/aws-services/aws-ec2-ebs-elb-ssm-vpc-and-vpn-enum/README.md +++ b/src/pentesting-cloud/aws-security/aws-services/aws-ec2-ebs-elb-ssm-vpc-and-vpn-enum/README.md @@ -130,7 +130,7 @@ aws ec2 describe-vpc-peering-connections ### अनधिकृत पहुँच {{#ref}} -../../aws-unauthenticated-enum-access/aws-ec2-unauthenticated-enum.md +../../aws-unauthenticated-enum-access/aws-ec2-unauthenticated-enum/README.md {{#endref}} ### प्रिवेस्क @@ -138,7 +138,7 @@ aws ec2 describe-vpc-peering-connections अगली पृष्ठ पर आप देख सकते हैं कि **EC2 अनुमतियों का दुरुपयोग करके विशेषाधिकार कैसे बढ़ाएं**: {{#ref}} -../../aws-privilege-escalation/aws-ec2-privesc.md +../../aws-privilege-escalation/aws-ec2-privesc/README.md {{#endref}} ### पोस्ट-एक्सप्लॉइटेशन @@ -162,7 +162,7 @@ Amazon **EBS** (Elastic Block Store) **स्नैपशॉट** मूल र अगली पृष्ठ पर आप देख सकते हैं कि **EBS अनुमतियों का दुरुपयोग करके विशेषाधिकार कैसे बढ़ाएं**: {{#ref}} -../../aws-privilege-escalation/aws-ebs-privesc.md +../../aws-privilege-escalation/aws-ebs-privesc/README.md {{#endref}} ## SSM @@ -191,7 +191,7 @@ ps aux | grep amazon-ssm निम्नलिखित पृष्ठ पर आप देख सकते हैं कि **SSM अनुमतियों का दुरुपयोग करके विशेषाधिकार कैसे बढ़ाएं**: {{#ref}} -../../aws-privilege-escalation/aws-ssm-privesc.md +../../aws-privilege-escalation/aws-ssm-privesc/README.md {{#endref}} ### Perssistence @@ -199,7 +199,7 @@ ps aux | grep amazon-ssm निम्नलिखित पृष्ठ पर आप देख सकते हैं कि **SSM अनुमतियों का दुरुपयोग करके स्थिरता कैसे प्राप्त करें**: {{#ref}} -../../aws-persistence/aws-ssm-persistence.md +../../aws-persistence/aws-ssm-persistence/README.md {{#endref}} ## ELB @@ -312,7 +312,7 @@ aws ec2 describe-vpn-connections #### **पोस्ट एक्सप्लॉइटेशन** {{#ref}} -../../aws-post-exploitation/aws-vpn-post-exploitation.md +../../aws-post-exploitation/aws-vpn-post-exploitation/README.md {{#endref}} ## संदर्भ diff --git a/src/pentesting-cloud/aws-security/aws-services/aws-ecr-enum.md b/src/pentesting-cloud/aws-security/aws-services/aws-ecr-enum.md index ab84b3491..893c13eac 100644 --- a/src/pentesting-cloud/aws-security/aws-services/aws-ecr-enum.md +++ b/src/pentesting-cloud/aws-security/aws-services/aws-ecr-enum.md @@ -68,7 +68,7 @@ aws ecr get-repository-policy --repository-name ### Unauthenticated Enum {{#ref}} -../aws-unauthenticated-enum-access/aws-ecr-unauthenticated-enum.md +../aws-unauthenticated-enum-access/aws-ecr-unauthenticated-enum/README.md {{#endref}} ### Privesc @@ -76,19 +76,19 @@ aws ecr get-repository-policy --repository-name निम्नलिखित पृष्ठ पर आप **ECR अनुमतियों का दुरुपयोग करके विशेषाधिकार बढ़ाने** के तरीके की जांच कर सकते हैं: {{#ref}} -../aws-privilege-escalation/aws-ecr-privesc.md +../aws-privilege-escalation/aws-ecr-privesc/README.md {{#endref}} ### Post Exploitation {{#ref}} -../aws-post-exploitation/aws-ecr-post-exploitation.md +../aws-post-exploitation/aws-ecr-post-exploitation/README.md {{#endref}} ### Persistence {{#ref}} -../aws-persistence/aws-ecr-persistence.md +../aws-persistence/aws-ecr-persistence/README.md {{#endref}} ## References diff --git a/src/pentesting-cloud/aws-security/aws-services/aws-ecs-enum.md b/src/pentesting-cloud/aws-security/aws-services/aws-ecs-enum.md index a627ca4b0..ea9fd6041 100644 --- a/src/pentesting-cloud/aws-security/aws-services/aws-ecs-enum.md +++ b/src/pentesting-cloud/aws-security/aws-services/aws-ecs-enum.md @@ -54,7 +54,7 @@ aws ecs describe-task-definition --task-definition : ### अनधिकृत पहुँच {{#ref}} -../aws-unauthenticated-enum-access/aws-ecs-unauthenticated-enum.md +../aws-unauthenticated-enum-access/aws-ecs-unauthenticated-enum/README.md {{#endref}} ### प्रिवेस्क @@ -62,19 +62,19 @@ aws ecs describe-task-definition --task-definition : अगली पृष्ठ पर आप **ECS अनुमतियों का दुरुपयोग करके विशेषाधिकार बढ़ाने** के तरीके की जांच कर सकते हैं: {{#ref}} -../aws-privilege-escalation/aws-ecs-privesc.md +../aws-privilege-escalation/aws-ecs-privesc/README.md {{#endref}} ### पोस्ट एक्सप्लोइटेशन {{#ref}} -../aws-post-exploitation/aws-ecs-post-exploitation.md +../aws-post-exploitation/aws-ecs-post-exploitation/README.md {{#endref}} ### स्थिरता {{#ref}} -../aws-persistence/aws-ecs-persistence.md +../aws-persistence/aws-ecs-persistence/README.md {{#endref}} {{#include ../../../banners/hacktricks-training.md}} diff --git a/src/pentesting-cloud/aws-security/aws-services/aws-efs-enum.md b/src/pentesting-cloud/aws-security/aws-services/aws-efs-enum.md index f2a347de0..5521edaca 100644 --- a/src/pentesting-cloud/aws-security/aws-services/aws-efs-enum.md +++ b/src/pentesting-cloud/aws-security/aws-services/aws-efs-enum.md @@ -214,19 +214,19 @@ get_efs_info(ip_address) ## प्रिवेस्क {{#ref}} -../aws-privilege-escalation/aws-efs-privesc.md +../aws-privilege-escalation/aws-efs-privesc/README.md {{#endref}} ## पोस्ट एक्सप्लोइटेशन {{#ref}} -../aws-post-exploitation/aws-efs-post-exploitation.md +../aws-post-exploitation/aws-efs-post-exploitation/README.md {{#endref}} ## पर्सिस्टेंस {{#ref}} -../aws-persistence/aws-efs-persistence.md +../aws-persistence/aws-efs-persistence/README.md {{#endref}} {{#include ../../../banners/hacktricks-training.md}} diff --git a/src/pentesting-cloud/aws-security/aws-services/aws-eks-enum.md b/src/pentesting-cloud/aws-security/aws-services/aws-eks-enum.md index f6dd2bc53..0cca8fd55 100644 --- a/src/pentesting-cloud/aws-security/aws-services/aws-eks-enum.md +++ b/src/pentesting-cloud/aws-security/aws-services/aws-eks-enum.md @@ -34,7 +34,7 @@ aws eks describe-update --name --update-id #### पोस्ट एक्सप्लॉइटेशन {{#ref}} -../aws-post-exploitation/aws-eks-post-exploitation.md +../aws-post-exploitation/aws-eks-post-exploitation/README.md {{#endref}} ## संदर्भ diff --git a/src/pentesting-cloud/aws-security/aws-services/aws-elastic-beanstalk-enum.md b/src/pentesting-cloud/aws-security/aws-services/aws-elastic-beanstalk-enum.md index c452098fa..d3f1f5823 100644 --- a/src/pentesting-cloud/aws-security/aws-services/aws-elastic-beanstalk-enum.md +++ b/src/pentesting-cloud/aws-security/aws-services/aws-elastic-beanstalk-enum.md @@ -87,25 +87,25 @@ aws elasticbeanstalk describe-events ### अनधिकृत पहुँच {{#ref}} -../aws-unauthenticated-enum-access/aws-elastic-beanstalk-unauthenticated-enum.md +../aws-unauthenticated-enum-access/aws-elastic-beanstalk-unauthenticated-enum/README.md {{#endref}} ### स्थिरता {{#ref}} -../aws-persistence/aws-elastic-beanstalk-persistence.md +../aws-persistence/aws-elastic-beanstalk-persistence/README.md {{#endref}} ### विशेषाधिकार वृद्धि {{#ref}} -../aws-privilege-escalation/aws-elastic-beanstalk-privesc.md +../aws-privilege-escalation/aws-elastic-beanstalk-privesc/README.md {{#endref}} ### पोस्ट एक्सप्लोइटेशन {{#ref}} -../aws-post-exploitation/aws-elastic-beanstalk-post-exploitation.md +../aws-post-exploitation/aws-elastic-beanstalk-post-exploitation/README.md {{#endref}} {{#include ../../../banners/hacktricks-training.md}} diff --git a/src/pentesting-cloud/aws-security/aws-services/aws-emr-enum.md b/src/pentesting-cloud/aws-security/aws-services/aws-emr-enum.md index 6f1c49a90..590c4488d 100644 --- a/src/pentesting-cloud/aws-security/aws-services/aws-emr-enum.md +++ b/src/pentesting-cloud/aws-security/aws-services/aws-emr-enum.md @@ -48,7 +48,7 @@ aws emr list-studios #Get studio URLs #### प्रिवेस्क {{#ref}} -../aws-privilege-escalation/aws-emr-privesc.md +../aws-privilege-escalation/aws-emr-privesc/README.md {{#endref}} ## संदर्भ diff --git a/src/pentesting-cloud/aws-security/aws-services/aws-iam-enum.md b/src/pentesting-cloud/aws-security/aws-services/aws-iam-enum.md index aa09a985e..65c7f76dc 100644 --- a/src/pentesting-cloud/aws-security/aws-services/aws-iam-enum.md +++ b/src/pentesting-cloud/aws-security/aws-services/aws-iam-enum.md @@ -213,7 +213,7 @@ steampipe dashboard ### अनधिकृत पहुंच {{#ref}} -../aws-unauthenticated-enum-access/aws-iam-and-sts-unauthenticated-enum.md +../aws-unauthenticated-enum-access/aws-iam-and-sts-unauthenticated-enum/README.md {{#endref}} ### विशेषाधिकार वृद्धि @@ -221,19 +221,19 @@ steampipe dashboard अगली पृष्ठ पर आप **IAM अनुमतियों का दुरुपयोग करके विशेषाधिकार बढ़ाने** का तरीका देख सकते हैं: {{#ref}} -../aws-privilege-escalation/aws-iam-privesc.md +../aws-privilege-escalation/aws-iam-privesc/README.md {{#endref}} ### IAM पोस्ट एक्सप्लोइटेशन {{#ref}} -../aws-post-exploitation/aws-iam-post-exploitation.md +../aws-post-exploitation/aws-iam-post-exploitation/README.md {{#endref}} ### IAM स्थिरता {{#ref}} -../aws-persistence/aws-iam-persistence.md +../aws-persistence/aws-iam-persistence/README.md {{#endref}} ## IAM पहचान केंद्र @@ -340,19 +340,19 @@ external_id = 123456 ### अनधिकृत पहुँच {{#ref}} -../aws-unauthenticated-enum-access/aws-identity-center-and-sso-unauthenticated-enum.md +../aws-unauthenticated-enum-access/aws-identity-center-and-sso-unauthenticated-enum/README.md {{#endref}} ### विशेषाधिकार वृद्धि {{#ref}} -../aws-privilege-escalation/aws-sso-and-identitystore-privesc.md +../aws-privilege-escalation/aws-sso-and-identitystore-privesc/README.md {{#endref}} ### पोस्ट एक्सप्लोइटेशन {{#ref}} -../aws-post-exploitation/aws-sso-and-identitystore-post-exploitation.md +../aws-post-exploitation/aws-sso-and-identitystore-post-exploitation/README.md {{#endref}} ### स्थिरता diff --git a/src/pentesting-cloud/aws-security/aws-services/aws-kms-enum.md b/src/pentesting-cloud/aws-security/aws-services/aws-kms-enum.md index f3f7d30e2..086fda45f 100644 --- a/src/pentesting-cloud/aws-security/aws-services/aws-kms-enum.md +++ b/src/pentesting-cloud/aws-security/aws-services/aws-kms-enum.md @@ -137,19 +137,19 @@ done ### प्रिवेस्क {{#ref}} -../aws-privilege-escalation/aws-kms-privesc.md +../aws-privilege-escalation/aws-kms-privesc/README.md {{#endref}} ### पोस्ट एक्सप्लोइटेशन {{#ref}} -../aws-post-exploitation/aws-kms-post-exploitation.md +../aws-post-exploitation/aws-kms-post-exploitation/README.md {{#endref}} ### पर्सिस्टेंस {{#ref}} -../aws-persistence/aws-kms-persistence.md +../aws-persistence/aws-kms-persistence/README.md {{#endref}} ## संदर्भ diff --git a/src/pentesting-cloud/aws-security/aws-services/aws-lambda-enum.md b/src/pentesting-cloud/aws-security/aws-services/aws-lambda-enum.md index 880d2859e..264c4c791 100644 --- a/src/pentesting-cloud/aws-security/aws-services/aws-lambda-enum.md +++ b/src/pentesting-cloud/aws-security/aws-services/aws-lambda-enum.md @@ -143,13 +143,13 @@ aws --profile level6 --region us-west-2 apigateway get-stages --rest-api-id "s33 अगली पृष्ठ पर आप देख सकते हैं कि **Lambda अनुमतियों का दुरुपयोग करके विशेषाधिकार कैसे बढ़ाएं**: {{#ref}} -../aws-privilege-escalation/aws-lambda-privesc.md +../aws-privilege-escalation/aws-lambda-privesc/README.md {{#endref}} ### अनधिकृत पहुंच {{#ref}} -../aws-unauthenticated-enum-access/aws-lambda-unauthenticated-access.md +../aws-unauthenticated-enum-access/aws-lambda-unauthenticated-access/README.md {{#endref}} ### पोस्ट एक्सप्लोइटेशन diff --git a/src/pentesting-cloud/aws-security/aws-services/aws-lightsail-enum.md b/src/pentesting-cloud/aws-security/aws-services/aws-lightsail-enum.md index 1380285f9..7ce524bff 100644 --- a/src/pentesting-cloud/aws-security/aws-services/aws-lightsail-enum.md +++ b/src/pentesting-cloud/aws-security/aws-services/aws-lightsail-enum.md @@ -39,19 +39,19 @@ aws lightsail get-key-pairs ### प्रिवेस्क {{#ref}} -../aws-privilege-escalation/aws-lightsail-privesc.md +../aws-privilege-escalation/aws-lightsail-privesc/README.md {{#endref}} ### पोस्ट एक्सप्लोइटेशन {{#ref}} -../aws-post-exploitation/aws-lightsail-post-exploitation.md +../aws-post-exploitation/aws-lightsail-post-exploitation/README.md {{#endref}} ### स्थिरता {{#ref}} -../aws-persistence/aws-lightsail-persistence.md +../aws-persistence/aws-lightsail-persistence/README.md {{#endref}} {{#include ../../../banners/hacktricks-training.md}} diff --git a/src/pentesting-cloud/aws-security/aws-services/aws-macie-enum.md b/src/pentesting-cloud/aws-security/aws-services/aws-macie-enum.md index ea686ed0e..21ab21ef1 100644 --- a/src/pentesting-cloud/aws-security/aws-services/aws-macie-enum.md +++ b/src/pentesting-cloud/aws-security/aws-services/aws-macie-enum.md @@ -123,7 +123,7 @@ aws macie2 get-usage-statistic ### Privesc {{#ref}} -../aws-privilege-escalation/aws-macie-privesc.md +../aws-privilege-escalation/aws-macie-privesc/README.md {{#endref}} ### Post Exploitation diff --git a/src/pentesting-cloud/aws-security/aws-services/aws-mq-enum.md b/src/pentesting-cloud/aws-security/aws-services/aws-mq-enum.md index 03a61ae10..6143fe531 100644 --- a/src/pentesting-cloud/aws-security/aws-services/aws-mq-enum.md +++ b/src/pentesting-cloud/aws-security/aws-services/aws-mq-enum.md @@ -53,13 +53,13 @@ aws mq create-user --broker-id --password --username --c ## Privesc {{#ref}} -../aws-privilege-escalation/aws-mq-privesc.md +../aws-privilege-escalation/aws-mq-privesc/README.md {{#endref}} ## Unauthenticated Access {{#ref}} -../aws-unauthenticated-enum-access/aws-mq-unauthenticated-enum.md +../aws-unauthenticated-enum-access/aws-mq-unauthenticated-enum/README.md {{#endref}} ## Persistence diff --git a/src/pentesting-cloud/aws-security/aws-services/aws-msk-enum.md b/src/pentesting-cloud/aws-security/aws-services/aws-msk-enum.md index 57b86fd67..9833bceae 100644 --- a/src/pentesting-cloud/aws-security/aws-services/aws-msk-enum.md +++ b/src/pentesting-cloud/aws-security/aws-services/aws-msk-enum.md @@ -75,13 +75,13 @@ kafka_2.12-2.8.1/bin/kafka-console-consumer.sh --bootstrap-server $BS --consumer ### Privesc {{#ref}} -../aws-privilege-escalation/aws-msk-privesc.md +../aws-privilege-escalation/aws-msk-privesc/README.md {{#endref}} ### Unauthenticated Access {{#ref}} -../aws-unauthenticated-enum-access/aws-msk-unauthenticated-enum.md +../aws-unauthenticated-enum-access/aws-msk-unauthenticated-enum/README.md {{#endref}} ### Persistence diff --git a/src/pentesting-cloud/aws-security/aws-services/aws-redshift-enum.md b/src/pentesting-cloud/aws-security/aws-services/aws-redshift-enum.md index 059fb06fa..74317ece0 100644 --- a/src/pentesting-cloud/aws-security/aws-services/aws-redshift-enum.md +++ b/src/pentesting-cloud/aws-security/aws-services/aws-redshift-enum.md @@ -84,7 +84,7 @@ psql -h redshift-cluster-1.sdflju3jdfkfg.us-east-1.redshift.amazonaws.com -U adm ## प्रिवेस्क {{#ref}} -../aws-privilege-escalation/aws-redshift-privesc.md +../aws-privilege-escalation/aws-redshift-privesc/README.md {{#endref}} ## स्थिरता diff --git a/src/pentesting-cloud/aws-security/aws-services/aws-relational-database-rds-enum.md b/src/pentesting-cloud/aws-security/aws-services/aws-relational-database-rds-enum.md index ec17e3640..142ea308c 100644 --- a/src/pentesting-cloud/aws-security/aws-services/aws-relational-database-rds-enum.md +++ b/src/pentesting-cloud/aws-security/aws-services/aws-relational-database-rds-enum.md @@ -108,25 +108,25 @@ aws rds modify-db-instance --db-instance-identifier --master-user-password ### अनधिकृत पहुँच {{#ref}} -../aws-unauthenticated-enum-access/aws-rds-unauthenticated-enum.md +../aws-unauthenticated-enum-access/aws-rds-unauthenticated-enum/README.md {{#endref}} ### प्रिवेस्क {{#ref}} -../aws-privilege-escalation/aws-rds-privesc.md +../aws-privilege-escalation/aws-rds-privesc/README.md {{#endref}} ### पोस्ट एक्सप्लोइटेशन {{#ref}} -../aws-post-exploitation/aws-rds-post-exploitation.md +../aws-post-exploitation/aws-rds-post-exploitation/README.md {{#endref}} ### स्थिरता {{#ref}} -../aws-persistence/aws-rds-persistence.md +../aws-persistence/aws-rds-persistence/README.md {{#endref}} ### SQL इंजेक्शन diff --git a/src/pentesting-cloud/aws-security/aws-services/aws-route53-enum.md b/src/pentesting-cloud/aws-security/aws-services/aws-route53-enum.md index 1fdd3e450..b05c10030 100644 --- a/src/pentesting-cloud/aws-security/aws-services/aws-route53-enum.md +++ b/src/pentesting-cloud/aws-security/aws-services/aws-route53-enum.md @@ -23,7 +23,7 @@ aws route53 list-traffic-policies ### प्रिवेस्क {{#ref}} -../aws-privilege-escalation/route53-createhostedzone-route53-changeresourcerecordsets-acm-pca-issuecertificate-acm-pca-getcer.md +../aws-privilege-escalation/route53-createhostedzone-route53-changeresourcerecordsets-acm-pca-issuecertificate-acm-pca-getcer/README.md {{#endref}} {{#include ../../../banners/hacktricks-training.md}} diff --git a/src/pentesting-cloud/aws-security/aws-services/aws-s3-athena-and-glacier-enum.md b/src/pentesting-cloud/aws-security/aws-services/aws-s3-athena-and-glacier-enum.md index 809ffc681..8940590d2 100644 --- a/src/pentesting-cloud/aws-security/aws-services/aws-s3-athena-and-glacier-enum.md +++ b/src/pentesting-cloud/aws-security/aws-services/aws-s3-athena-and-glacier-enum.md @@ -241,25 +241,25 @@ aws s3api put-object-acl --bucket --key flag --access-control-poli अगली पृष्ठ में आप **S3 अनुमतियों का दुरुपयोग करके विशेषाधिकार बढ़ाने** के तरीके की जांच कर सकते हैं: {{#ref}} -../aws-privilege-escalation/aws-s3-privesc.md +../aws-privilege-escalation/aws-s3-privesc/README.md {{#endref}} ### Unauthenticated Access {{#ref}} -../aws-unauthenticated-enum-access/aws-s3-unauthenticated-enum.md +../aws-unauthenticated-enum-access/aws-s3-unauthenticated-enum/README.md {{#endref}} ### S3 Post Exploitation {{#ref}} -../aws-post-exploitation/aws-s3-post-exploitation.md +../aws-post-exploitation/aws-s3-post-exploitation/README.md {{#endref}} ### Persistence {{#ref}} -../aws-persistence/aws-s3-persistence.md +../aws-persistence/aws-s3-persistence/README.md {{#endref}} ## Other S3 vulns diff --git a/src/pentesting-cloud/aws-security/aws-services/aws-secrets-manager-enum.md b/src/pentesting-cloud/aws-security/aws-services/aws-secrets-manager-enum.md index 1fe24c5c1..4928101da 100644 --- a/src/pentesting-cloud/aws-security/aws-services/aws-secrets-manager-enum.md +++ b/src/pentesting-cloud/aws-security/aws-services/aws-secrets-manager-enum.md @@ -30,19 +30,19 @@ aws secretsmanager get-resource-policy --secret-id --secret-id ### प्रिवेस्क {{#ref}} -../aws-privilege-escalation/aws-secrets-manager-privesc.md +../aws-privilege-escalation/aws-secrets-manager-privesc/README.md {{#endref}} ### पोस्ट एक्सप्लोइटेशन {{#ref}} -../aws-post-exploitation/aws-secrets-manager-post-exploitation.md +../aws-post-exploitation/aws-secrets-manager-post-exploitation/README.md {{#endref}} ### पर्सिस्टेंस {{#ref}} -../aws-persistence/aws-secrets-manager-persistence.md +../aws-persistence/aws-secrets-manager-persistence/README.md {{#endref}} {{#include ../../../banners/hacktricks-training.md}} diff --git a/src/pentesting-cloud/aws-security/aws-services/aws-security-and-detection-services/aws-cloudtrail-enum.md b/src/pentesting-cloud/aws-security/aws-services/aws-security-and-detection-services/aws-cloudtrail-enum.md index 629a892d0..7eeaca6e1 100644 --- a/src/pentesting-cloud/aws-security/aws-services/aws-security-and-detection-services/aws-cloudtrail-enum.md +++ b/src/pentesting-cloud/aws-security/aws-services/aws-security-and-detection-services/aws-cloudtrail-enum.md @@ -211,7 +211,7 @@ Check more information in the [**orginal research**](https://medium.com/@TalBeer अधिक जानकारी में: {{#ref}} -../../aws-post-exploitation/aws-eks-post-exploitation.md +../../aws-post-exploitation/aws-eks-post-exploitation/README.md {{#endref}} ### CloudTrail कॉन्फ़िग को संशोधित करना @@ -259,7 +259,7 @@ aws s3api put-bucket-lifecycle --bucket --lifecycle-configuration यह मूल रूप से एक **S3-KMS रैनसमवेयर** है जो कि इस में समझाया गया है: {{#ref}} -../../aws-post-exploitation/aws-s3-post-exploitation.md +../../aws-post-exploitation/aws-s3-post-exploitation/README.md {{#endref}} **KMS रैनसमवेयर** @@ -267,7 +267,7 @@ aws s3api put-bucket-lifecycle --bucket --lifecycle-configuration यह विभिन्न अनुमतियों की आवश्यकताओं के साथ पिछले हमले को करने का सबसे आसान तरीका है: {{#ref}} -../../aws-post-exploitation/aws-kms-post-exploitation.md +../../aws-post-exploitation/aws-kms-post-exploitation/README.md {{#endref}} ## **संदर्भ** diff --git a/src/pentesting-cloud/aws-security/aws-services/aws-security-and-detection-services/aws-control-tower-enum.md b/src/pentesting-cloud/aws-security/aws-services/aws-security-and-detection-services/aws-control-tower-enum.md index 35525e8e1..b225047c8 100644 --- a/src/pentesting-cloud/aws-security/aws-services/aws-security-and-detection-services/aws-control-tower-enum.md +++ b/src/pentesting-cloud/aws-security/aws-services/aws-security-and-detection-services/aws-control-tower-enum.md @@ -34,7 +34,7 @@ aws controltower list-enabled-controls --target-identifier arn:aws:organizations ### Post Exploitation & Persistence {{#ref}} -../../aws-post-exploitation/aws-control-tower-post-exploitation.md +../../aws-post-exploitation/aws-control-tower-post-exploitation/README.md {{#endref}} {{#include ../../../../banners/hacktricks-training.md}} diff --git a/src/pentesting-cloud/aws-security/aws-services/aws-ses-enum.md b/src/pentesting-cloud/aws-security/aws-services/aws-ses-enum.md index a159096cb..14df5a3d5 100644 --- a/src/pentesting-cloud/aws-security/aws-services/aws-ses-enum.md +++ b/src/pentesting-cloud/aws-security/aws-services/aws-ses-enum.md @@ -115,7 +115,7 @@ aws ses get-send-statistics ### पोस्ट एक्सप्लॉइटेशन {{#ref}} -../aws-post-exploitation/aws-ses-post-exploitation.md +../aws-post-exploitation/aws-ses-post-exploitation/README.md {{#endref}} {{#include ../../../banners/hacktricks-training.md}} diff --git a/src/pentesting-cloud/aws-security/aws-services/aws-sns-enum.md b/src/pentesting-cloud/aws-security/aws-services/aws-sns-enum.md index f578b2c4d..8c452c800 100644 --- a/src/pentesting-cloud/aws-security/aws-services/aws-sns-enum.md +++ b/src/pentesting-cloud/aws-security/aws-services/aws-sns-enum.md @@ -49,25 +49,25 @@ aws sns subscribe --region \ #### Unauthenticated Access {{#ref}} -../aws-unauthenticated-enum-access/aws-sns-unauthenticated-enum.md +../aws-unauthenticated-enum-access/aws-sns-unauthenticated-enum/README.md {{#endref}} #### Privilege Escalation {{#ref}} -../aws-privilege-escalation/aws-sns-privesc.md +../aws-privilege-escalation/aws-sns-privesc/README.md {{#endref}} #### Post Exploitation {{#ref}} -../aws-post-exploitation/aws-sns-post-exploitation.md +../aws-post-exploitation/aws-sns-post-exploitation/README.md {{#endref}} #### Persistence {{#ref}} -../aws-persistence/aws-sns-persistence.md +../aws-persistence/aws-sns-persistence/README.md {{#endref}} ## References diff --git a/src/pentesting-cloud/aws-security/aws-services/aws-sqs-and-sns-enum.md b/src/pentesting-cloud/aws-security/aws-services/aws-sqs-and-sns-enum.md index ab2304b27..d239a00fa 100644 --- a/src/pentesting-cloud/aws-security/aws-services/aws-sqs-and-sns-enum.md +++ b/src/pentesting-cloud/aws-security/aws-services/aws-sqs-and-sns-enum.md @@ -23,25 +23,25 @@ aws sqs send-message --queue-url --message-body #### Unauthenticated Access {{#ref}} -../aws-unauthenticated-enum-access/aws-sqs-unauthenticated-enum.md +../aws-unauthenticated-enum-access/aws-sqs-unauthenticated-enum/README.md {{#endref}} #### Privilege Escalation {{#ref}} -../aws-privilege-escalation/aws-sqs-privesc.md +../aws-privilege-escalation/aws-sqs-privesc/README.md {{#endref}} #### Post Exploitation {{#ref}} -../aws-post-exploitation/aws-sqs-post-exploitation.md +../aws-post-exploitation/aws-sqs-post-exploitation/README.md {{#endref}} #### Persistence {{#ref}} -../aws-persistence/aws-sqs-persistence.md +../aws-persistence/aws-sqs-persistence/README.md {{#endref}} ## References diff --git a/src/pentesting-cloud/aws-security/aws-services/aws-stepfunctions-enum.md b/src/pentesting-cloud/aws-security/aws-services/aws-stepfunctions-enum.md index b788e14c1..43059e70a 100644 --- a/src/pentesting-cloud/aws-security/aws-services/aws-stepfunctions-enum.md +++ b/src/pentesting-cloud/aws-security/aws-services/aws-stepfunctions-enum.md @@ -302,19 +302,19 @@ aws stepfunctions list-executions --map-run-arn [--status-filter --token-code इस पृष्ठ पर आप **STS अनुमतियों का दुरुपयोग करके विशेषाधिकार बढ़ाने** के तरीके की जांच कर सकते हैं: {{#ref}} -../aws-privilege-escalation/aws-sts-privesc.md +../aws-privilege-escalation/aws-sts-privesc/README.md {{#endref}} ### Post Exploitation {{#ref}} -../aws-post-exploitation/aws-sts-post-exploitation.md +../aws-post-exploitation/aws-sts-post-exploitation/README.md {{#endref}} ### Persistence {{#ref}} -../aws-persistence/aws-sts-persistence.md +../aws-persistence/aws-sts-persistence/README.md {{#endref}} ## References diff --git a/src/pentesting-cloud/aws-security/aws-services/eventbridgescheduler-enum.md b/src/pentesting-cloud/aws-security/aws-services/eventbridgescheduler-enum.md index b9ef7f61d..3993db885 100644 --- a/src/pentesting-cloud/aws-security/aws-services/eventbridgescheduler-enum.md +++ b/src/pentesting-cloud/aws-security/aws-services/eventbridgescheduler-enum.md @@ -67,7 +67,7 @@ aws scheduler list-tags-for-resource --resource-arn निम्नलिखित पृष्ठ में, आप देख सकते हैं कि **इवेंटब्रिज शेड्यूलर अनुमतियों का दुरुपयोग करके विशेषाधिकार कैसे बढ़ाएं**: {{#ref}} -../aws-privilege-escalation/eventbridgescheduler-privesc.md +../aws-privilege-escalation/eventbridgescheduler-privesc/README.md {{#endref}} ## References