From 0167a155682582229bca2ceaf17cedc1b481c822 Mon Sep 17 00:00:00 2001 From: creep33 <30846349+creep33@users.noreply.github.com> Date: Mon, 24 Nov 2025 21:32:30 +0100 Subject: [PATCH 1/3] fix links in unauthenticated enum access --- .../aws-unauthenticated-enum-access/README.md | 36 +++++++++---------- 1 file changed, 18 insertions(+), 18 deletions(-) diff --git a/src/pentesting-cloud/aws-security/aws-unauthenticated-enum-access/README.md b/src/pentesting-cloud/aws-security/aws-unauthenticated-enum-access/README.md index 0250a6992..54f75cd63 100644 --- a/src/pentesting-cloud/aws-security/aws-unauthenticated-enum-access/README.md +++ b/src/pentesting-cloud/aws-security/aws-unauthenticated-enum-access/README.md @@ -15,24 +15,24 @@ Some useful **tools**: There are several services in AWS that could be configured giving some kind of access to all Internet or to more people than expected. Check here how: -- [**Accounts Unauthenticated Enum**](aws-accounts-unauthenticated-enum/README.md) -- [**Cloud9 Unauthenticated Enum**](https://github.com/carlospolop/hacktricks-cloud/blob/master/pentesting-cloud/aws-security/aws-unauthenticated-enum-access/broken-reference/README.md) -- [**Cloudfront Unauthenticated Enum**](aws-cloudfront-unauthenticated-enum/README.md) -- [**Cloudsearch Unauthenticated Enum**](https://github.com/carlospolop/hacktricks-cloud/blob/master/pentesting-cloud/aws-security/aws-unauthenticated-enum-access/broken-reference/README.md) -- [**Cognito Unauthenticated Enum**](aws-cognito-unauthenticated-enum/README.md) -- [**DocumentDB Unauthenticated Enum**](aws-documentdb-enum/README.md) -- [**EC2 Unauthenticated Enum**](aws-ec2-unauthenticated-enum/README.md) -- [**Elasticsearch Unauthenticated Enum**](aws-elasticsearch-unauthenticated-enum/README.md) -- [**IAM Unauthenticated Enum**](aws-iam-and-sts-unauthenticated-enum/README.md) -- [**IoT Unauthenticated Access**](aws-iot-unauthenticated-enum/README.md) -- [**Kinesis Video Unauthenticated Access**](aws-kinesis-video-unauthenticated-enum/README.md) -- [**Media Unauthenticated Access**](aws-media-unauthenticated-enum/README.md) -- [**MQ Unauthenticated Access**](aws-mq-unauthenticated-enum/README.md) -- [**MSK Unauthenticated Access**](aws-msk-unauthenticated-enum/README.md) -- [**RDS Unauthenticated Access**](aws-rds-unauthenticated-enum/README.md) -- [**Redshift Unauthenticated Access**](aws-redshift-unauthenticated-enum/README.md) -- [**SQS Unauthenticated Access**](aws-sqs-unauthenticated-enum/README.md) -- [**S3 Unauthenticated Access**](aws-s3-unauthenticated-enum/README.md) +- [**Accounts Unauthenticated Enum**](aws-accounts-unauthenticated-enum/index.html) +- [**Cloud9 Unauthenticated Enum**](https://github.com/carlospolop/hacktricks-cloud/blob/master/pentesting-cloud/aws-security/aws-unauthenticated-enum-access/broken-reference/index.html) +- [**Cloudfront Unauthenticated Enum**](aws-cloudfront-unauthenticated-enum/index.html) +- [**Cloudsearch Unauthenticated Enum**](https://github.com/carlospolop/hacktricks-cloud/blob/master/pentesting-cloud/aws-security/aws-unauthenticated-enum-access/broken-reference/index.html) +- [**Cognito Unauthenticated Enum**](aws-cognito-unauthenticated-enum/index.html) +- [**DocumentDB Unauthenticated Enum**](aws-documentdb-enum/index.html) +- [**EC2 Unauthenticated Enum**](aws-ec2-unauthenticated-enum/index.html) +- [**Elasticsearch Unauthenticated Enum**](aws-elasticsearch-unauthenticated-enum/index.html) +- [**IAM Unauthenticated Enum**](aws-iam-and-sts-unauthenticated-enum/index.html) +- [**IoT Unauthenticated Access**](aws-iot-unauthenticated-enum/index.html) +- [**Kinesis Video Unauthenticated Access**](aws-kinesis-video-unauthenticated-enum/index.html) +- [**Media Unauthenticated Access**](aws-media-unauthenticated-enum/index.html) +- [**MQ Unauthenticated Access**](aws-mq-unauthenticated-enum/index.html) +- [**MSK Unauthenticated Access**](aws-msk-unauthenticated-enum/index.html) +- [**RDS Unauthenticated Access**](aws-rds-unauthenticated-enum/index.html) +- [**Redshift Unauthenticated Access**](aws-redshift-unauthenticated-enum/index.html) +- [**SQS Unauthenticated Access**](aws-sqs-unauthenticated-enum/index.html) +- [**S3 Unauthenticated Access**](aws-s3-unauthenticated-enum/index.html) ## Cross Account Attacks From 7c68eeecc65dd87c523cd91dda8964447e1df409 Mon Sep 17 00:00:00 2001 From: creep33 <30846349+creep33@users.noreply.github.com> Date: Mon, 24 Nov 2025 21:59:48 +0100 Subject: [PATCH 2/3] Update list --- .../aws-unauthenticated-enum-access/README.md | 30 ++++++++++++------- 1 file changed, 19 insertions(+), 11 deletions(-) diff --git a/src/pentesting-cloud/aws-security/aws-unauthenticated-enum-access/README.md b/src/pentesting-cloud/aws-security/aws-unauthenticated-enum-access/README.md index 54f75cd63..e1a49104e 100644 --- a/src/pentesting-cloud/aws-security/aws-unauthenticated-enum-access/README.md +++ b/src/pentesting-cloud/aws-security/aws-unauthenticated-enum-access/README.md @@ -16,23 +16,31 @@ Some useful **tools**: There are several services in AWS that could be configured giving some kind of access to all Internet or to more people than expected. Check here how: - [**Accounts Unauthenticated Enum**](aws-accounts-unauthenticated-enum/index.html) -- [**Cloud9 Unauthenticated Enum**](https://github.com/carlospolop/hacktricks-cloud/blob/master/pentesting-cloud/aws-security/aws-unauthenticated-enum-access/broken-reference/index.html) +- [**API Gateway Unauthenticated Enum**](aws-api-gateway-unauthenticated-enum/index.html) - [**Cloudfront Unauthenticated Enum**](aws-cloudfront-unauthenticated-enum/index.html) -- [**Cloudsearch Unauthenticated Enum**](https://github.com/carlospolop/hacktricks-cloud/blob/master/pentesting-cloud/aws-security/aws-unauthenticated-enum-access/broken-reference/index.html) +- [**Codebuild Unauthenticated Access**](aws-codebuild-unauthenticated-access/index.html) - [**Cognito Unauthenticated Enum**](aws-cognito-unauthenticated-enum/index.html) - [**DocumentDB Unauthenticated Enum**](aws-documentdb-enum/index.html) +- [**DynamoDB Unauthenticated Access**](aws-dynamodb-unauthenticated-access/index.html) - [**EC2 Unauthenticated Enum**](aws-ec2-unauthenticated-enum/index.html) +- [**EC2 Unauthenticated Enum**](aws-ecr-unauthenticated-enum/index.html) +- [**ECS Unauthenticated Enum**](aws-ecs-unauthenticated-enum/index.html) +- [**Elastic Beanstalk Unauthenticated Enum**](aws-elastic-beanstalk-unauthenticated-enum/index.html) - [**Elasticsearch Unauthenticated Enum**](aws-elasticsearch-unauthenticated-enum/index.html) - [**IAM Unauthenticated Enum**](aws-iam-and-sts-unauthenticated-enum/index.html) -- [**IoT Unauthenticated Access**](aws-iot-unauthenticated-enum/index.html) -- [**Kinesis Video Unauthenticated Access**](aws-kinesis-video-unauthenticated-enum/index.html) -- [**Media Unauthenticated Access**](aws-media-unauthenticated-enum/index.html) -- [**MQ Unauthenticated Access**](aws-mq-unauthenticated-enum/index.html) -- [**MSK Unauthenticated Access**](aws-msk-unauthenticated-enum/index.html) -- [**RDS Unauthenticated Access**](aws-rds-unauthenticated-enum/index.html) -- [**Redshift Unauthenticated Access**](aws-redshift-unauthenticated-enum/index.html) -- [**SQS Unauthenticated Access**](aws-sqs-unauthenticated-enum/index.html) -- [**S3 Unauthenticated Access**](aws-s3-unauthenticated-enum/index.html) +- [**Identity Center and SSO Unauthenticated Enum**](aws-identity-center-and-sso-unauthenticated-enum/index.html) +- [**IoT Unauthenticated Enum**](aws-iot-unauthenticated-enum/index.html) +- [**Kinesis Video Unauthenticated Enum**](aws-kinesis-video-unauthenticated-enum/index.html) +- [**Lambda Unauthenticated Access**](aws-lambda-unauthenticated-access/index.html) +- [**Media Unauthenticated Enum**](aws-media-unauthenticated-enum/index.html) +- [**MQ Unauthenticated Enum**](aws-mq-unauthenticated-enum/index.html) +- [**MSK Unauthenticated Enum**](aws-msk-unauthenticated-enum/index.html) +- [**RDS Unauthenticated Enum**](aws-rds-unauthenticated-enum/index.html) +- [**Redshift Unauthenticated Enum**](aws-redshift-unauthenticated-enum/index.html) +- [**S3 Unauthenticated Enum**](aws-s3-unauthenticated-enum/index.html) +- [**Sagemaker Unauthenticated Enum**](aws-sagemaker-unauthenticated-enum/index.html) +- [**SNS Unauthenticated Enum**](aws-sns-unauthenticated-enum/index.html) +- [**SQS Unauthenticated Enum**](aws-sqs-unauthenticated-enum/index.html) ## Cross Account Attacks From 24d60416c89c871034c572d7818319d861f12807 Mon Sep 17 00:00:00 2001 From: SirBroccoli Date: Mon, 24 Nov 2025 22:37:18 +0100 Subject: [PATCH 3/3] Update README.md --- .../aws-security/aws-unauthenticated-enum-access/README.md | 2 -- 1 file changed, 2 deletions(-) diff --git a/src/pentesting-cloud/aws-security/aws-unauthenticated-enum-access/README.md b/src/pentesting-cloud/aws-security/aws-unauthenticated-enum-access/README.md index e1a49104e..b0434a762 100644 --- a/src/pentesting-cloud/aws-security/aws-unauthenticated-enum-access/README.md +++ b/src/pentesting-cloud/aws-security/aws-unauthenticated-enum-access/README.md @@ -23,8 +23,6 @@ There are several services in AWS that could be configured giving some kind of a - [**DocumentDB Unauthenticated Enum**](aws-documentdb-enum/index.html) - [**DynamoDB Unauthenticated Access**](aws-dynamodb-unauthenticated-access/index.html) - [**EC2 Unauthenticated Enum**](aws-ec2-unauthenticated-enum/index.html) -- [**EC2 Unauthenticated Enum**](aws-ecr-unauthenticated-enum/index.html) -- [**ECS Unauthenticated Enum**](aws-ecs-unauthenticated-enum/index.html) - [**Elastic Beanstalk Unauthenticated Enum**](aws-elastic-beanstalk-unauthenticated-enum/index.html) - [**Elasticsearch Unauthenticated Enum**](aws-elasticsearch-unauthenticated-enum/index.html) - [**IAM Unauthenticated Enum**](aws-iam-and-sts-unauthenticated-enum/index.html)