mirror of
https://github.com/HackTricks-wiki/hacktricks-cloud.git
synced 2026-02-04 11:07:37 -08:00
Fix unmatched refs
This commit is contained in:
@@ -16,7 +16,7 @@ Wenn Anmeldeinformationen in Codebuild festgelegt wurden, um sich mit Github, Gi
|
||||
Daher, wenn Sie Zugriff auf den Geheimnismanager haben, können Sie diese Geheimnisse abrufen und zu der verbundenen Plattform pivotieren.
|
||||
|
||||
{{#ref}}
|
||||
../../aws-privilege-escalation/aws-secrets-manager-privesc.md
|
||||
../../aws-privilege-escalation/aws-secrets-manager-privesc/README.md
|
||||
{{#endref}}
|
||||
|
||||
### Missbrauch des CodeBuild-Repo-Zugriffs
|
||||
|
||||
@@ -263,25 +263,25 @@ Um einen API-Schlüssel funktionsfähig zu machen, müssen Sie ihn zu einem **Nu
|
||||
## Unauthentifizierter Zugriff
|
||||
|
||||
{{#ref}}
|
||||
../aws-unauthenticated-enum-access/aws-api-gateway-unauthenticated-enum.md
|
||||
../aws-unauthenticated-enum-access/aws-api-gateway-unauthenticated-enum/README.md
|
||||
{{#endref}}
|
||||
|
||||
## Privesc
|
||||
|
||||
{{#ref}}
|
||||
../aws-privilege-escalation/aws-apigateway-privesc.md
|
||||
../aws-privilege-escalation/aws-apigateway-privesc/README.md
|
||||
{{#endref}}
|
||||
|
||||
## Post-Exploitation
|
||||
|
||||
{{#ref}}
|
||||
../aws-post-exploitation/aws-api-gateway-post-exploitation.md
|
||||
../aws-post-exploitation/aws-api-gateway-post-exploitation/README.md
|
||||
{{#endref}}
|
||||
|
||||
## Persistenz
|
||||
|
||||
{{#ref}}
|
||||
../aws-persistence/aws-api-gateway-persistence.md
|
||||
../aws-persistence/aws-api-gateway-persistence/README.md
|
||||
{{#endref}}
|
||||
|
||||
{{#include ../../../banners/hacktricks-training.md}}
|
||||
|
||||
@@ -40,7 +40,7 @@ In der folgenden Seite kannst du überprüfen, wie man **CloudFormation-Berechti
|
||||
### Persistence
|
||||
|
||||
{{#ref}}
|
||||
../aws-persistence/aws-cloudformation-persistence.md
|
||||
../aws-persistence/aws-cloudformation-persistence/README.md
|
||||
{{#endref}}
|
||||
|
||||
### Post-Exploitation
|
||||
|
||||
@@ -30,13 +30,13 @@ aws cloudfront list-distributions | jq ".DistributionList.Items[] | .Id, .Origin
|
||||
## Unauthentifizierter Zugriff
|
||||
|
||||
{{#ref}}
|
||||
../aws-unauthenticated-enum-access/aws-cloudfront-unauthenticated-enum.md
|
||||
../aws-unauthenticated-enum-access/aws-cloudfront-unauthenticated-enum/README.md
|
||||
{{#endref}}
|
||||
|
||||
## Nach der Ausnutzung
|
||||
|
||||
{{#ref}}
|
||||
../aws-post-exploitation/aws-cloudfront-post-exploitation.md
|
||||
../aws-post-exploitation/aws-cloudfront-post-exploitation/README.md
|
||||
{{#endref}}
|
||||
|
||||
{{#include ../../../banners/hacktricks-training.md}}
|
||||
|
||||
@@ -52,7 +52,7 @@ aws codebuild describe-test-cases --report-arn <ARN>
|
||||
Auf der folgenden Seite können Sie überprüfen, wie Sie **Codebuild-Berechtigungen missbrauchen, um Privilegien zu eskalieren**:
|
||||
|
||||
{{#ref}}
|
||||
../aws-privilege-escalation/aws-codebuild-privesc.md
|
||||
../aws-privilege-escalation/aws-codebuild-privesc/README.md
|
||||
{{#endref}}
|
||||
|
||||
### Post Exploitation
|
||||
@@ -64,7 +64,7 @@ Auf der folgenden Seite können Sie überprüfen, wie Sie **Codebuild-Berechtigu
|
||||
### Unauthenticated Access
|
||||
|
||||
{{#ref}}
|
||||
../aws-unauthenticated-enum-access/aws-codebuild-unauthenticated-access.md
|
||||
../aws-unauthenticated-enum-access/aws-codebuild-unauthenticated-access/README.md
|
||||
{{#endref}}
|
||||
|
||||
## References
|
||||
|
||||
@@ -82,19 +82,19 @@ Selbst wenn Sie **keinen gültigen Benutzernamen** innerhalb von Cognito kennen,
|
||||
## Privesc
|
||||
|
||||
{{#ref}}
|
||||
../../aws-privilege-escalation/aws-cognito-privesc.md
|
||||
../../aws-privilege-escalation/aws-cognito-privesc/README.md
|
||||
{{#endref}}
|
||||
|
||||
## Unauthenticated Access
|
||||
|
||||
{{#ref}}
|
||||
../../aws-unauthenticated-enum-access/aws-cognito-unauthenticated-enum.md
|
||||
../../aws-unauthenticated-enum-access/aws-cognito-unauthenticated-enum/README.md
|
||||
{{#endref}}
|
||||
|
||||
## Persistence
|
||||
|
||||
{{#ref}}
|
||||
../../aws-persistence/aws-cognito-persistence.md
|
||||
../../aws-persistence/aws-cognito-persistence/README.md
|
||||
{{#endref}}
|
||||
|
||||
{{#include ../../../../banners/hacktricks-training.md}}
|
||||
|
||||
@@ -28,7 +28,7 @@ aws datapipeline get-pipeline-definition --pipeline-id <ID>
|
||||
Auf der folgenden Seite können Sie überprüfen, wie Sie **Datapipeline-Berechtigungen missbrauchen, um Privilegien zu eskalieren**:
|
||||
|
||||
{{#ref}}
|
||||
../aws-privilege-escalation/aws-datapipeline-privesc.md
|
||||
../aws-privilege-escalation/aws-datapipeline-privesc/README.md
|
||||
{{#endref}}
|
||||
|
||||
## CodePipeline
|
||||
@@ -49,7 +49,7 @@ aws codepipeline get-pipeline-state --name <pipeline_name>
|
||||
Auf der folgenden Seite können Sie überprüfen, wie man **CodePipeline-Berechtigungen missbraucht, um Privilegien zu eskalieren**:
|
||||
|
||||
{{#ref}}
|
||||
../aws-privilege-escalation/aws-codepipeline-privesc.md
|
||||
../aws-privilege-escalation/aws-codepipeline-privesc/README.md
|
||||
{{#endref}}
|
||||
|
||||
## CodeCommit
|
||||
|
||||
@@ -48,7 +48,7 @@ Beachten Sie, dass wenn die **Beschreibung** des Verzeichnisses ein **Domäne**
|
||||
### Privilegieneskalation
|
||||
|
||||
{{#ref}}
|
||||
../aws-privilege-escalation/aws-directory-services-privesc.md
|
||||
../aws-privilege-escalation/aws-directory-services-privesc/README.md
|
||||
{{#endref}}
|
||||
|
||||
## Persistenz
|
||||
@@ -109,7 +109,7 @@ aws workdocs add-resource-permissions --resource-id <id> --principals Id=anonymo
|
||||
### Privesc
|
||||
|
||||
{{#ref}}
|
||||
../aws-privilege-escalation/aws-workdocs-privesc.md
|
||||
../aws-privilege-escalation/aws-workdocs-privesc/README.md
|
||||
{{#endref}}
|
||||
|
||||
{{#include ../../../banners/hacktricks-training.md}}
|
||||
|
||||
@@ -56,25 +56,25 @@ aws dynamodb describe-endpoints #Dynamodb endpoints
|
||||
### Unauthenticated Access
|
||||
|
||||
{{#ref}}
|
||||
../aws-unauthenticated-enum-access/aws-dynamodb-unauthenticated-access.md
|
||||
../aws-unauthenticated-enum-access/aws-dynamodb-unauthenticated-access/README.md
|
||||
{{#endref}}
|
||||
|
||||
### Privesc
|
||||
|
||||
{{#ref}}
|
||||
../aws-privilege-escalation/aws-dynamodb-privesc.md
|
||||
../aws-privilege-escalation/aws-dynamodb-privesc/README.md
|
||||
{{#endref}}
|
||||
|
||||
### Post Exploitation
|
||||
|
||||
{{#ref}}
|
||||
../aws-post-exploitation/aws-dynamodb-post-exploitation.md
|
||||
../aws-post-exploitation/aws-dynamodb-post-exploitation/README.md
|
||||
{{#endref}}
|
||||
|
||||
### Persistence
|
||||
|
||||
{{#ref}}
|
||||
../aws-persistence/aws-dynamodb-persistence.md
|
||||
../aws-persistence/aws-dynamodb-persistence/README.md
|
||||
{{#endref}}
|
||||
|
||||
## DynamoDB Injection
|
||||
|
||||
@@ -130,7 +130,7 @@ aws ec2 describe-vpc-peering-connections
|
||||
### Unauthenticated Access
|
||||
|
||||
{{#ref}}
|
||||
../../aws-unauthenticated-enum-access/aws-ec2-unauthenticated-enum.md
|
||||
../../aws-unauthenticated-enum-access/aws-ec2-unauthenticated-enum/README.md
|
||||
{{#endref}}
|
||||
|
||||
### Privesc
|
||||
@@ -138,7 +138,7 @@ aws ec2 describe-vpc-peering-connections
|
||||
Auf der folgenden Seite können Sie überprüfen, wie man **EC2-Berechtigungen missbraucht, um Privilegien zu eskalieren**:
|
||||
|
||||
{{#ref}}
|
||||
../../aws-privilege-escalation/aws-ec2-privesc.md
|
||||
../../aws-privilege-escalation/aws-ec2-privesc/README.md
|
||||
{{#endref}}
|
||||
|
||||
### Post-Exploitation
|
||||
@@ -162,7 +162,7 @@ Eine **AMI** wird verwendet, um **eine EC2-Instanz zu starten**, während ein EC
|
||||
Auf der folgenden Seite können Sie überprüfen, wie man **EBS-Berechtigungen missbraucht, um Privilegien zu eskalieren**:
|
||||
|
||||
{{#ref}}
|
||||
../../aws-privilege-escalation/aws-ebs-privesc.md
|
||||
../../aws-privilege-escalation/aws-ebs-privesc/README.md
|
||||
{{#endref}}
|
||||
|
||||
## SSM
|
||||
@@ -191,7 +191,7 @@ ps aux | grep amazon-ssm
|
||||
Auf der folgenden Seite können Sie überprüfen, wie Sie **SSM-Berechtigungen missbrauchen, um Privilegien zu eskalieren**:
|
||||
|
||||
{{#ref}}
|
||||
../../aws-privilege-escalation/aws-ssm-privesc.md
|
||||
../../aws-privilege-escalation/aws-ssm-privesc/README.md
|
||||
{{#endref}}
|
||||
|
||||
### Persistenz
|
||||
@@ -199,7 +199,7 @@ Auf der folgenden Seite können Sie überprüfen, wie Sie **SSM-Berechtigungen m
|
||||
Auf der folgenden Seite können Sie überprüfen, wie Sie **SSM-Berechtigungen missbrauchen, um Persistenz zu erreichen**:
|
||||
|
||||
{{#ref}}
|
||||
../../aws-persistence/aws-ssm-persistence.md
|
||||
../../aws-persistence/aws-ssm-persistence/README.md
|
||||
{{#endref}}
|
||||
|
||||
## ELB
|
||||
@@ -312,7 +312,7 @@ Wenn eine **VPN-Verbindung hergestellt wurde**, sollten Sie nach **`.opvn`**-Kon
|
||||
#### **Post-Exploitation**
|
||||
|
||||
{{#ref}}
|
||||
../../aws-post-exploitation/aws-vpn-post-exploitation.md
|
||||
../../aws-post-exploitation/aws-vpn-post-exploitation/README.md
|
||||
{{#endref}}
|
||||
|
||||
## Referenzen
|
||||
|
||||
@@ -68,7 +68,7 @@ aws ecr get-repository-policy --repository-name <repo_name>
|
||||
### Unauthenticated Enum
|
||||
|
||||
{{#ref}}
|
||||
../aws-unauthenticated-enum-access/aws-ecr-unauthenticated-enum.md
|
||||
../aws-unauthenticated-enum-access/aws-ecr-unauthenticated-enum/README.md
|
||||
{{#endref}}
|
||||
|
||||
### Privesc
|
||||
@@ -76,19 +76,19 @@ aws ecr get-repository-policy --repository-name <repo_name>
|
||||
Auf der folgenden Seite können Sie überprüfen, wie man **ECR-Berechtigungen missbraucht, um Privilegien zu eskalieren**:
|
||||
|
||||
{{#ref}}
|
||||
../aws-privilege-escalation/aws-ecr-privesc.md
|
||||
../aws-privilege-escalation/aws-ecr-privesc/README.md
|
||||
{{#endref}}
|
||||
|
||||
### Post Exploitation
|
||||
|
||||
{{#ref}}
|
||||
../aws-post-exploitation/aws-ecr-post-exploitation.md
|
||||
../aws-post-exploitation/aws-ecr-post-exploitation/README.md
|
||||
{{#endref}}
|
||||
|
||||
### Persistence
|
||||
|
||||
{{#ref}}
|
||||
../aws-persistence/aws-ecr-persistence.md
|
||||
../aws-persistence/aws-ecr-persistence/README.md
|
||||
{{#endref}}
|
||||
|
||||
## References
|
||||
|
||||
@@ -54,7 +54,7 @@ aws ecs describe-task-definition --task-definition <TASK_NAME>:<VERSION>
|
||||
### Unauthentifizierter Zugriff
|
||||
|
||||
{{#ref}}
|
||||
../aws-unauthenticated-enum-access/aws-ecs-unauthenticated-enum.md
|
||||
../aws-unauthenticated-enum-access/aws-ecs-unauthenticated-enum/README.md
|
||||
{{#endref}}
|
||||
|
||||
### Privilegieneskalation
|
||||
@@ -62,19 +62,19 @@ aws ecs describe-task-definition --task-definition <TASK_NAME>:<VERSION>
|
||||
Auf der folgenden Seite können Sie überprüfen, wie man **ECS-Berechtigungen missbraucht, um Privilegien zu eskalieren**:
|
||||
|
||||
{{#ref}}
|
||||
../aws-privilege-escalation/aws-ecs-privesc.md
|
||||
../aws-privilege-escalation/aws-ecs-privesc/README.md
|
||||
{{#endref}}
|
||||
|
||||
### Post-Exploitation
|
||||
|
||||
{{#ref}}
|
||||
../aws-post-exploitation/aws-ecs-post-exploitation.md
|
||||
../aws-post-exploitation/aws-ecs-post-exploitation/README.md
|
||||
{{#endref}}
|
||||
|
||||
### Persistenz
|
||||
|
||||
{{#ref}}
|
||||
../aws-persistence/aws-ecs-persistence.md
|
||||
../aws-persistence/aws-ecs-persistence/README.md
|
||||
{{#endref}}
|
||||
|
||||
{{#include ../../../banners/hacktricks-training.md}}
|
||||
|
||||
@@ -214,19 +214,19 @@ get_efs_info(ip_address)
|
||||
## Privesc
|
||||
|
||||
{{#ref}}
|
||||
../aws-privilege-escalation/aws-efs-privesc.md
|
||||
../aws-privilege-escalation/aws-efs-privesc/README.md
|
||||
{{#endref}}
|
||||
|
||||
## Post Exploitation
|
||||
|
||||
{{#ref}}
|
||||
../aws-post-exploitation/aws-efs-post-exploitation.md
|
||||
../aws-post-exploitation/aws-efs-post-exploitation/README.md
|
||||
{{#endref}}
|
||||
|
||||
## Persistence
|
||||
|
||||
{{#ref}}
|
||||
../aws-persistence/aws-efs-persistence.md
|
||||
../aws-persistence/aws-efs-persistence/README.md
|
||||
{{#endref}}
|
||||
|
||||
{{#include ../../../banners/hacktricks-training.md}}
|
||||
|
||||
@@ -34,7 +34,7 @@ aws eks describe-update --name <name> --update-id <id>
|
||||
#### Nach der Ausnutzung
|
||||
|
||||
{{#ref}}
|
||||
../aws-post-exploitation/aws-eks-post-exploitation.md
|
||||
../aws-post-exploitation/aws-eks-post-exploitation/README.md
|
||||
{{#endref}}
|
||||
|
||||
## Referenzen
|
||||
|
||||
@@ -87,25 +87,25 @@ aws elasticbeanstalk describe-events
|
||||
### Unauthentifizierter Zugriff
|
||||
|
||||
{{#ref}}
|
||||
../aws-unauthenticated-enum-access/aws-elastic-beanstalk-unauthenticated-enum.md
|
||||
../aws-unauthenticated-enum-access/aws-elastic-beanstalk-unauthenticated-enum/README.md
|
||||
{{#endref}}
|
||||
|
||||
### Persistenz
|
||||
|
||||
{{#ref}}
|
||||
../aws-persistence/aws-elastic-beanstalk-persistence.md
|
||||
../aws-persistence/aws-elastic-beanstalk-persistence/README.md
|
||||
{{#endref}}
|
||||
|
||||
### Privilegieneskalation
|
||||
|
||||
{{#ref}}
|
||||
../aws-privilege-escalation/aws-elastic-beanstalk-privesc.md
|
||||
../aws-privilege-escalation/aws-elastic-beanstalk-privesc/README.md
|
||||
{{#endref}}
|
||||
|
||||
### Nach der Ausnutzung
|
||||
|
||||
{{#ref}}
|
||||
../aws-post-exploitation/aws-elastic-beanstalk-post-exploitation.md
|
||||
../aws-post-exploitation/aws-elastic-beanstalk-post-exploitation/README.md
|
||||
{{#endref}}
|
||||
|
||||
{{#include ../../../banners/hacktricks-training.md}}
|
||||
|
||||
@@ -48,7 +48,7 @@ aws emr list-studios #Get studio URLs
|
||||
#### Privesc
|
||||
|
||||
{{#ref}}
|
||||
../aws-privilege-escalation/aws-emr-privesc.md
|
||||
../aws-privilege-escalation/aws-emr-privesc/README.md
|
||||
{{#endref}}
|
||||
|
||||
## Referenzen
|
||||
|
||||
@@ -213,7 +213,7 @@ Keines der vorherigen Tools ist in der Lage, nahezu alle Berechtigungen zu über
|
||||
### Unauthenticated Access
|
||||
|
||||
{{#ref}}
|
||||
../aws-unauthenticated-enum-access/aws-iam-and-sts-unauthenticated-enum.md
|
||||
../aws-unauthenticated-enum-access/aws-iam-and-sts-unauthenticated-enum/README.md
|
||||
{{#endref}}
|
||||
|
||||
### Privilege Escalation
|
||||
@@ -221,19 +221,19 @@ Keines der vorherigen Tools ist in der Lage, nahezu alle Berechtigungen zu über
|
||||
Auf der folgenden Seite kannst du überprüfen, wie man **IAM-Berechtigungen missbraucht, um Privilegien zu eskalieren**:
|
||||
|
||||
{{#ref}}
|
||||
../aws-privilege-escalation/aws-iam-privesc.md
|
||||
../aws-privilege-escalation/aws-iam-privesc/README.md
|
||||
{{#endref}}
|
||||
|
||||
### IAM Post Exploitation
|
||||
|
||||
{{#ref}}
|
||||
../aws-post-exploitation/aws-iam-post-exploitation.md
|
||||
../aws-post-exploitation/aws-iam-post-exploitation/README.md
|
||||
{{#endref}}
|
||||
|
||||
### IAM Persistence
|
||||
|
||||
{{#ref}}
|
||||
../aws-persistence/aws-iam-persistence.md
|
||||
../aws-persistence/aws-iam-persistence/README.md
|
||||
{{#endref}}
|
||||
|
||||
## IAM Identity Center
|
||||
@@ -340,19 +340,19 @@ external_id = 123456
|
||||
### Unauthentifizierter Zugriff
|
||||
|
||||
{{#ref}}
|
||||
../aws-unauthenticated-enum-access/aws-identity-center-and-sso-unauthenticated-enum.md
|
||||
../aws-unauthenticated-enum-access/aws-identity-center-and-sso-unauthenticated-enum/README.md
|
||||
{{#endref}}
|
||||
|
||||
### Privilegienerweiterung
|
||||
|
||||
{{#ref}}
|
||||
../aws-privilege-escalation/aws-sso-and-identitystore-privesc.md
|
||||
../aws-privilege-escalation/aws-sso-and-identitystore-privesc/README.md
|
||||
{{#endref}}
|
||||
|
||||
### Nach der Ausnutzung
|
||||
|
||||
{{#ref}}
|
||||
../aws-post-exploitation/aws-sso-and-identitystore-post-exploitation.md
|
||||
../aws-post-exploitation/aws-sso-and-identitystore-post-exploitation/README.md
|
||||
{{#endref}}
|
||||
|
||||
### Persistenz
|
||||
|
||||
@@ -137,19 +137,19 @@ done
|
||||
### Privesc
|
||||
|
||||
{{#ref}}
|
||||
../aws-privilege-escalation/aws-kms-privesc.md
|
||||
../aws-privilege-escalation/aws-kms-privesc/README.md
|
||||
{{#endref}}
|
||||
|
||||
### Post Exploitation
|
||||
|
||||
{{#ref}}
|
||||
../aws-post-exploitation/aws-kms-post-exploitation.md
|
||||
../aws-post-exploitation/aws-kms-post-exploitation/README.md
|
||||
{{#endref}}
|
||||
|
||||
### Persistence
|
||||
|
||||
{{#ref}}
|
||||
../aws-persistence/aws-kms-persistence.md
|
||||
../aws-persistence/aws-kms-persistence/README.md
|
||||
{{#endref}}
|
||||
|
||||
## References
|
||||
|
||||
@@ -143,13 +143,13 @@ Es gibt viele andere Quellen, die eine Lambda-Funktion auslösen können.
|
||||
Auf der folgenden Seite können Sie überprüfen, wie Sie **Lambda-Berechtigungen missbrauchen können, um Privilegien zu eskalieren**:
|
||||
|
||||
{{#ref}}
|
||||
../aws-privilege-escalation/aws-lambda-privesc.md
|
||||
../aws-privilege-escalation/aws-lambda-privesc/README.md
|
||||
{{#endref}}
|
||||
|
||||
### Unauthentifizierter Zugriff
|
||||
|
||||
{{#ref}}
|
||||
../aws-unauthenticated-enum-access/aws-lambda-unauthenticated-access.md
|
||||
../aws-unauthenticated-enum-access/aws-lambda-unauthenticated-access/README.md
|
||||
{{#endref}}
|
||||
|
||||
### Post-Exploitation
|
||||
|
||||
@@ -39,19 +39,19 @@ Es ist möglich, **Instanz- und relationale Datenbank-Snapshots von Lightsail**
|
||||
### Privesc
|
||||
|
||||
{{#ref}}
|
||||
../aws-privilege-escalation/aws-lightsail-privesc.md
|
||||
../aws-privilege-escalation/aws-lightsail-privesc/README.md
|
||||
{{#endref}}
|
||||
|
||||
### Post Exploitation
|
||||
|
||||
{{#ref}}
|
||||
../aws-post-exploitation/aws-lightsail-post-exploitation.md
|
||||
../aws-post-exploitation/aws-lightsail-post-exploitation/README.md
|
||||
{{#endref}}
|
||||
|
||||
### Persistence
|
||||
|
||||
{{#ref}}
|
||||
../aws-persistence/aws-lightsail-persistence.md
|
||||
../aws-persistence/aws-lightsail-persistence/README.md
|
||||
{{#endref}}
|
||||
|
||||
{{#include ../../../banners/hacktricks-training.md}}
|
||||
|
||||
@@ -123,7 +123,7 @@ aws macie2 get-usage-statistic
|
||||
### Privesc
|
||||
|
||||
{{#ref}}
|
||||
../aws-privilege-escalation/aws-macie-privesc.md
|
||||
../aws-privilege-escalation/aws-macie-privesc/README.md
|
||||
{{#endref}}
|
||||
|
||||
### Post Exploitation
|
||||
|
||||
@@ -53,13 +53,13 @@ aws mq create-user --broker-id <value> --password <value> --username <value> --c
|
||||
## Privesc
|
||||
|
||||
{{#ref}}
|
||||
../aws-privilege-escalation/aws-mq-privesc.md
|
||||
../aws-privilege-escalation/aws-mq-privesc/README.md
|
||||
{{#endref}}
|
||||
|
||||
## Unauthenticated Access
|
||||
|
||||
{{#ref}}
|
||||
../aws-unauthenticated-enum-access/aws-mq-unauthenticated-enum.md
|
||||
../aws-unauthenticated-enum-access/aws-mq-unauthenticated-enum/README.md
|
||||
{{#endref}}
|
||||
|
||||
## Persistence
|
||||
|
||||
@@ -75,13 +75,13 @@ kafka_2.12-2.8.1/bin/kafka-console-consumer.sh --bootstrap-server $BS --consumer
|
||||
### Privesc
|
||||
|
||||
{{#ref}}
|
||||
../aws-privilege-escalation/aws-msk-privesc.md
|
||||
../aws-privilege-escalation/aws-msk-privesc/README.md
|
||||
{{#endref}}
|
||||
|
||||
### Unauthenticated Access
|
||||
|
||||
{{#ref}}
|
||||
../aws-unauthenticated-enum-access/aws-msk-unauthenticated-enum.md
|
||||
../aws-unauthenticated-enum-access/aws-msk-unauthenticated-enum/README.md
|
||||
{{#endref}}
|
||||
|
||||
### Persistence
|
||||
|
||||
@@ -84,7 +84,7 @@ psql -h redshift-cluster-1.sdflju3jdfkfg.us-east-1.redshift.amazonaws.com -U adm
|
||||
## Privesc
|
||||
|
||||
{{#ref}}
|
||||
../aws-privilege-escalation/aws-redshift-privesc.md
|
||||
../aws-privilege-escalation/aws-redshift-privesc/README.md
|
||||
{{#endref}}
|
||||
|
||||
## Persistenz
|
||||
|
||||
@@ -108,25 +108,25 @@ aws rds modify-db-instance --db-instance-identifier <ID> --master-user-password
|
||||
### Unauthenticated Access
|
||||
|
||||
{{#ref}}
|
||||
../aws-unauthenticated-enum-access/aws-rds-unauthenticated-enum.md
|
||||
../aws-unauthenticated-enum-access/aws-rds-unauthenticated-enum/README.md
|
||||
{{#endref}}
|
||||
|
||||
### Privesc
|
||||
|
||||
{{#ref}}
|
||||
../aws-privilege-escalation/aws-rds-privesc.md
|
||||
../aws-privilege-escalation/aws-rds-privesc/README.md
|
||||
{{#endref}}
|
||||
|
||||
### Post Exploitation
|
||||
|
||||
{{#ref}}
|
||||
../aws-post-exploitation/aws-rds-post-exploitation.md
|
||||
../aws-post-exploitation/aws-rds-post-exploitation/README.md
|
||||
{{#endref}}
|
||||
|
||||
### Persistence
|
||||
|
||||
{{#ref}}
|
||||
../aws-persistence/aws-rds-persistence.md
|
||||
../aws-persistence/aws-rds-persistence/README.md
|
||||
{{#endref}}
|
||||
|
||||
### SQL Injection
|
||||
|
||||
@@ -23,7 +23,7 @@ aws route53 list-traffic-policies
|
||||
### Privesc
|
||||
|
||||
{{#ref}}
|
||||
../aws-privilege-escalation/route53-createhostedzone-route53-changeresourcerecordsets-acm-pca-issuecertificate-acm-pca-getcer.md
|
||||
../aws-privilege-escalation/route53-createhostedzone-route53-changeresourcerecordsets-acm-pca-issuecertificate-acm-pca-getcer/README.md
|
||||
{{#endref}}
|
||||
|
||||
{{#include ../../../banners/hacktricks-training.md}}
|
||||
|
||||
@@ -241,25 +241,25 @@ Dual-Stack-Endpunkte verwenden die folgende Syntax:
|
||||
Auf der folgenden Seite können Sie überprüfen, wie man **S3-Berechtigungen missbrauchen kann, um Privilegien zu eskalieren**:
|
||||
|
||||
{{#ref}}
|
||||
../aws-privilege-escalation/aws-s3-privesc.md
|
||||
../aws-privilege-escalation/aws-s3-privesc/README.md
|
||||
{{#endref}}
|
||||
|
||||
### Unauthenticated Access
|
||||
|
||||
{{#ref}}
|
||||
../aws-unauthenticated-enum-access/aws-s3-unauthenticated-enum.md
|
||||
../aws-unauthenticated-enum-access/aws-s3-unauthenticated-enum/README.md
|
||||
{{#endref}}
|
||||
|
||||
### S3 Post Exploitation
|
||||
|
||||
{{#ref}}
|
||||
../aws-post-exploitation/aws-s3-post-exploitation.md
|
||||
../aws-post-exploitation/aws-s3-post-exploitation/README.md
|
||||
{{#endref}}
|
||||
|
||||
### Persistence
|
||||
|
||||
{{#ref}}
|
||||
../aws-persistence/aws-s3-persistence.md
|
||||
../aws-persistence/aws-s3-persistence/README.md
|
||||
{{#endref}}
|
||||
|
||||
## Other S3 vulns
|
||||
|
||||
@@ -30,19 +30,19 @@ aws secretsmanager get-resource-policy --secret-id --secret-id <secret_name>
|
||||
### Privesc
|
||||
|
||||
{{#ref}}
|
||||
../aws-privilege-escalation/aws-secrets-manager-privesc.md
|
||||
../aws-privilege-escalation/aws-secrets-manager-privesc/README.md
|
||||
{{#endref}}
|
||||
|
||||
### Post Exploitation
|
||||
|
||||
{{#ref}}
|
||||
../aws-post-exploitation/aws-secrets-manager-post-exploitation.md
|
||||
../aws-post-exploitation/aws-secrets-manager-post-exploitation/README.md
|
||||
{{#endref}}
|
||||
|
||||
### Persistence
|
||||
|
||||
{{#ref}}
|
||||
../aws-persistence/aws-secrets-manager-persistence.md
|
||||
../aws-persistence/aws-secrets-manager-persistence/README.md
|
||||
{{#endref}}
|
||||
|
||||
{{#include ../../../banners/hacktricks-training.md}}
|
||||
|
||||
@@ -211,7 +211,7 @@ Daher könnte ein Benutzer mit Zugriff auf EKS, der die URL der EKS-API entdeckt
|
||||
Weitere Informationen in:
|
||||
|
||||
{{#ref}}
|
||||
../../aws-post-exploitation/aws-eks-post-exploitation.md
|
||||
../../aws-post-exploitation/aws-eks-post-exploitation/README.md
|
||||
{{#endref}}
|
||||
|
||||
### CloudTrail-Konfiguration ändern
|
||||
@@ -259,7 +259,7 @@ Sie könnten **einen asymmetrischen Schlüssel generieren** und **CloudTrail die
|
||||
Dies ist im Grunde eine **S3-KMS-Ransomware**, die in folgendem erklärt wird:
|
||||
|
||||
{{#ref}}
|
||||
../../aws-post-exploitation/aws-s3-post-exploitation.md
|
||||
../../aws-post-exploitation/aws-s3-post-exploitation/README.md
|
||||
{{#endref}}
|
||||
|
||||
**KMS ransomware**
|
||||
@@ -267,7 +267,7 @@ Dies ist im Grunde eine **S3-KMS-Ransomware**, die in folgendem erklärt wird:
|
||||
Dies ist der einfachste Weg, um den vorherigen Angriff mit unterschiedlichen Berechtigungsanforderungen durchzuführen:
|
||||
|
||||
{{#ref}}
|
||||
../../aws-post-exploitation/aws-kms-post-exploitation.md
|
||||
../../aws-post-exploitation/aws-kms-post-exploitation/README.md
|
||||
{{#endref}}
|
||||
|
||||
## **References**
|
||||
|
||||
@@ -34,7 +34,7 @@ aws controltower list-enabled-controls --target-identifier arn:aws:organizations
|
||||
### Post Exploitation & Persistence
|
||||
|
||||
{{#ref}}
|
||||
../../aws-post-exploitation/aws-control-tower-post-exploitation.md
|
||||
../../aws-post-exploitation/aws-control-tower-post-exploitation/README.md
|
||||
{{#endref}}
|
||||
|
||||
{{#include ../../../../banners/hacktricks-training.md}}
|
||||
|
||||
@@ -115,7 +115,7 @@ aws ses get-send-statistics
|
||||
### Nach der Ausnutzung
|
||||
|
||||
{{#ref}}
|
||||
../aws-post-exploitation/aws-ses-post-exploitation.md
|
||||
../aws-post-exploitation/aws-ses-post-exploitation/README.md
|
||||
{{#endref}}
|
||||
|
||||
{{#include ../../../banners/hacktricks-training.md}}
|
||||
|
||||
@@ -49,25 +49,25 @@ aws sns subscribe --region <region>\
|
||||
#### Unauthenticated Access
|
||||
|
||||
{{#ref}}
|
||||
../aws-unauthenticated-enum-access/aws-sns-unauthenticated-enum.md
|
||||
../aws-unauthenticated-enum-access/aws-sns-unauthenticated-enum/README.md
|
||||
{{#endref}}
|
||||
|
||||
#### Privilege Escalation
|
||||
|
||||
{{#ref}}
|
||||
../aws-privilege-escalation/aws-sns-privesc.md
|
||||
../aws-privilege-escalation/aws-sns-privesc/README.md
|
||||
{{#endref}}
|
||||
|
||||
#### Post Exploitation
|
||||
|
||||
{{#ref}}
|
||||
../aws-post-exploitation/aws-sns-post-exploitation.md
|
||||
../aws-post-exploitation/aws-sns-post-exploitation/README.md
|
||||
{{#endref}}
|
||||
|
||||
#### Persistence
|
||||
|
||||
{{#ref}}
|
||||
../aws-persistence/aws-sns-persistence.md
|
||||
../aws-persistence/aws-sns-persistence/README.md
|
||||
{{#endref}}
|
||||
|
||||
## References
|
||||
|
||||
@@ -23,25 +23,25 @@ aws sqs send-message --queue-url <value> --message-body <value>
|
||||
#### Unauthenticated Access
|
||||
|
||||
{{#ref}}
|
||||
../aws-unauthenticated-enum-access/aws-sqs-unauthenticated-enum.md
|
||||
../aws-unauthenticated-enum-access/aws-sqs-unauthenticated-enum/README.md
|
||||
{{#endref}}
|
||||
|
||||
#### Privilege Escalation
|
||||
|
||||
{{#ref}}
|
||||
../aws-privilege-escalation/aws-sqs-privesc.md
|
||||
../aws-privilege-escalation/aws-sqs-privesc/README.md
|
||||
{{#endref}}
|
||||
|
||||
#### Post Exploitation
|
||||
|
||||
{{#ref}}
|
||||
../aws-post-exploitation/aws-sqs-post-exploitation.md
|
||||
../aws-post-exploitation/aws-sqs-post-exploitation/README.md
|
||||
{{#endref}}
|
||||
|
||||
#### Persistence
|
||||
|
||||
{{#ref}}
|
||||
../aws-persistence/aws-sqs-persistence.md
|
||||
../aws-persistence/aws-sqs-persistence/README.md
|
||||
{{#endref}}
|
||||
|
||||
## References
|
||||
|
||||
@@ -302,19 +302,19 @@ aws stepfunctions list-executions --map-run-arn <value> [--status-filter <RUNNIN
|
||||
Auf der folgenden Seite können Sie überprüfen, wie Sie **Step Functions-Berechtigungen missbrauchen können, um Privilegien zu eskalieren**:
|
||||
|
||||
{{#ref}}
|
||||
../aws-privilege-escalation/aws-stepfunctions-privesc.md
|
||||
../aws-privilege-escalation/aws-stepfunctions-privesc/README.md
|
||||
{{#endref}}
|
||||
|
||||
## Post Exploitation
|
||||
|
||||
{{#ref}}
|
||||
../aws-post-exploitation/aws-stepfunctions-post-exploitation.md
|
||||
../aws-post-exploitation/aws-stepfunctions-post-exploitation/README.md
|
||||
{{#endref}}
|
||||
|
||||
## Persistence
|
||||
|
||||
{{#ref}}
|
||||
../aws-persistence/aws-step-functions-persistence.md
|
||||
../aws-persistence/aws-step-functions-persistence/README.md
|
||||
{{#endref}}
|
||||
|
||||
## References
|
||||
|
||||
@@ -72,19 +72,19 @@ aws sts get-session-token --serial-number <arn_device> --token-code <otp_code>
|
||||
Auf der folgenden Seite können Sie überprüfen, wie man **STS-Berechtigungen missbraucht, um Privilegien zu eskalieren**:
|
||||
|
||||
{{#ref}}
|
||||
../aws-privilege-escalation/aws-sts-privesc.md
|
||||
../aws-privilege-escalation/aws-sts-privesc/README.md
|
||||
{{#endref}}
|
||||
|
||||
### Post Exploitation
|
||||
|
||||
{{#ref}}
|
||||
../aws-post-exploitation/aws-sts-post-exploitation.md
|
||||
../aws-post-exploitation/aws-sts-post-exploitation/README.md
|
||||
{{#endref}}
|
||||
|
||||
### Persistence
|
||||
|
||||
{{#ref}}
|
||||
../aws-persistence/aws-sts-persistence.md
|
||||
../aws-persistence/aws-sts-persistence/README.md
|
||||
{{#endref}}
|
||||
|
||||
## References
|
||||
|
||||
@@ -67,7 +67,7 @@ aws scheduler list-tags-for-resource --resource-arn <schedule_group_arn>
|
||||
Auf der folgenden Seite können Sie überprüfen, wie Sie **Eventbridge-Scheduler-Berechtigungen missbrauchen, um Privilegien zu eskalieren**:
|
||||
|
||||
{{#ref}}
|
||||
../aws-privilege-escalation/eventbridgescheduler-privesc.md
|
||||
../aws-privilege-escalation/eventbridgescheduler-privesc/README.md
|
||||
{{#endref}}
|
||||
|
||||
## References
|
||||
|
||||
Reference in New Issue
Block a user