Skip to content

Commit

Permalink
Merge pull request #223 from Hacking-the-Cloud/change_author_field
Browse files Browse the repository at this point in the history
Changed author tag to author_name
  • Loading branch information
Frichetten authored Dec 2, 2022
2 parents ce91197 + e8efe83 commit 03ac0b2
Show file tree
Hide file tree
Showing 60 changed files with 63 additions and 63 deletions.
2 changes: 1 addition & 1 deletion CONTRIBUTING.md
Original file line number Diff line number Diff line change
Expand Up @@ -38,7 +38,7 @@ After creating the file, please put the following at the top and fill it out.

```
---
author: <Your Name>
author_name: <Your Name>
title: <Page Title>
description: <A description of the page>
---
Expand Down
2 changes: 1 addition & 1 deletion content/aws/avoiding-detection/guardduty-pentest.md
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
---
author: Nick Frichette
author_name: Nick Frichette
title: Bypass GuardDuty Pentest Findings
description: Prevent Kali Linux, ParrotOS, and Pentoo Linux from throwing GuardDuty alerts by modifying the User Agent string.
hide:
Expand Down
2 changes: 1 addition & 1 deletion content/aws/avoiding-detection/guardduty-tor-client.md
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
---
author: Nick Frichette
author_name: Nick Frichette
title: "Bypass GuardDuty Tor Client Findings"
description: Connect to the Tor network from an EC2 instance without alerting GuardDuty.
hide:
Expand Down
2 changes: 1 addition & 1 deletion content/aws/avoiding-detection/modify-guardduty-config.md
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
---
author: Ben Leembruggen
author_name: Ben Leembruggen
title: Modify GuardDuty Configuration
description: Modify existing GuardDuty configurations in the target account to hinder alerting and remediation capabilities.
---
Expand Down
2 changes: 1 addition & 1 deletion content/aws/avoiding-detection/steal-keys-undetected.md
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
---
author: Nick Frichette
author_name: Nick Frichette
title: Bypass Credential Exfiltration Detection
description: When stealing IAM credentials from an EC2 instance you can avoid a GuardDuty detection by using VPC Endpoints.
hide:
Expand Down
2 changes: 1 addition & 1 deletion content/aws/capture_the_flag/cicdont.md
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
---
author: Nick Frichette
author_name: Nick Frichette
title: CI/CDon't
description: An AWS/GitLab CICD themed CTF.
---
Expand Down
2 changes: 1 addition & 1 deletion content/aws/deprecated/stealth_perm_enum.md
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
---
author: Nick Frichette
author_name: Nick Frichette
title: Enumerate Permissions without Logging to CloudTrail
description: Leverage a bug in the AWS API to enumerate permissions for a role without logging to CloudTrail and alerting the Blue Team.
hide:
Expand Down
2 changes: 1 addition & 1 deletion content/aws/deprecated/whoami.md
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
---
author: Nick Frichette
author_name: Nick Frichette
title: Whoami - Get Principal Name From Keys
description: During an assessment you may find AWS IAM credentials. Use these tactics to identify the principal of the keys.
hide:
Expand Down
2 changes: 1 addition & 1 deletion content/aws/enumeration/account_id_from_ec2.md
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
---
author: Phil Massyn
author_name: Phil Massyn
title: Enumerate AWS Account ID from an EC2 Instance
description: With access to an ec2 instance, you will be able to identify the AWS account it runs in.
---
Expand Down
2 changes: 1 addition & 1 deletion content/aws/enumeration/account_id_from_s3_bucket.md
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
---
author: Nick Frichette
author_name: Nick Frichette
title: Enumerate AWS Account ID from a Public S3 Bucket
description: Knowing only the name of a public S3 bucket, you can ascertain the account ID it resides in.
---
Expand Down
2 changes: 1 addition & 1 deletion content/aws/enumeration/brute_force_iam_permissions.md
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
---
author: Nick Frichette
author_name: Nick Frichette
title: Brute Force IAM Permissions
description: Brute force the IAM permissions of a user or role to see what you have access to.
---
Expand Down
2 changes: 1 addition & 1 deletion content/aws/enumeration/enum_iam_user_role.md
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
---
author: Nick Frichette
author_name: Nick Frichette
title: Unauthenticated Enumeration of IAM Users and Roles
description: Leverage cross account behaviors to enumerate IAM users and roles in a different AWS account without authentication.
hide:
Expand Down
2 changes: 1 addition & 1 deletion content/aws/enumeration/get-account-id-from-keys.md
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
---
author: Nick Frichette
author_name: Nick Frichette
title: Get Account ID from AWS Access Keys
description: During an assessment you may find AWS IAM credentials but not know what account they are associated with. Use this to get the account ID.
hide:
Expand Down
2 changes: 1 addition & 1 deletion content/aws/enumeration/whoami.md
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
---
author: Nick Frichette
author_name: Nick Frichette
title: Whoami - Get Principal Name From Keys
description: During an assessment you may find AWS IAM credentials. Use these tactics to identify the principal of the keys.
---
Expand Down
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
---
author: Nick Frichette
author_name: Nick Frichette
title: Misconfigured Resource-Based Policies
description: Common misconfigurations of resource-based policies and how they can be abused.
---
Expand Down
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
---
author: Nick Frichette
author_name: Nick Frichette
title: Abusing Misconfigured ECR Resource Policies
description: How to take advantage of misconfigured AWS ECR private repositories.
---
Expand Down Expand Up @@ -139,4 +139,4 @@ Account 009619941490 Scan Results (severity columns are for fails only):
```

!!! Note
`Condition` elements may induce false positives.
`Condition` elements may induce false positives.
2 changes: 1 addition & 1 deletion content/aws/exploitation/abusing-container-registry.md
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
---
author: Roi Lavie
author_name: Roi Lavie
title: Abusing Elastic Container Registry for Lateral Movement
description: With ECR permissions you can easily distribute a backdoor to production servers, developer's laptops, or CI/CD pipelines and own the environment by gaining privileged permissions.
hide:
Expand Down
2 changes: 1 addition & 1 deletion content/aws/exploitation/ec2-metadata-ssrf.md
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
---
author: Nick Frichette
author_name: Nick Frichette
title: Steal EC2 Metadata Credentials via SSRF
description: Old faithful; How to steal IAM Role credentials from the EC2 Metadata service via SSRF.
hide:
Expand Down
2 changes: 1 addition & 1 deletion content/aws/exploitation/iam_privilege_escalation.md
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
---
author: Nick Frichette
author_name: Nick Frichette
title: AWS IAM Privilege Escalation Techniques
description: Common techniques that can be leveraged to escalate privileges in an AWS account.
---
Expand Down
2 changes: 1 addition & 1 deletion content/aws/exploitation/lambda-steal-iam-credentials.md
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
---
author: Nick Frichette
author_name: Nick Frichette
title: Steal IAM Credentials and Event Data from Lambda
description: Leverage file read and SSRF vulnerabilities to steam IAM credentials and event data from Lambda.
hide:
Expand Down
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
---
author: Nick Frichette
author_name: Nick Frichette
title: "Local Privilege Escalation: User Data"
description: Escalate privileges on an EC2 instance by modifying the user-data scripts with modify-instance-attribute.
hide:
Expand Down
2 changes: 1 addition & 1 deletion content/aws/exploitation/local-priv-esc-user-data-s3.md
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
---
author: Nick Frichette
author_name: Nick Frichette
title: "Local Privilege Escalation: User Data 2"
description: Escalate privileges on an EC2 instance by modifying scripts and packages called by user data.
hide:
Expand Down
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
---
author: Houston Hopkins
author_name: Houston Hopkins
title: Simple Route53/Cloudfront/S3 Subdomain Takeover
description: Techniques for taking over subdomains or hostnames that use Cloudfront and/or a DNS record to serve content from Amazon S3.
hide:
Expand Down
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
---
author: Patryk Bogusz
author_name: Patryk Bogusz
title: AWS API Call Hijacking via ACM-PCA
description: By modifying the route53 entries and utilizing the acm-pca private CA one can hijack the calls to AWS API inside the AWS VPC
hide:
Expand Down
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
---
author: Nick Frichette
author_name: Nick Frichette
title: AWS Organizations Defaults
description: AWS Organizations is a common service to run into in AWS environments. It's default behavior can make it a target for attackers.
---
Expand Down
2 changes: 1 addition & 1 deletion content/aws/general-knowledge/connection-tracking.md
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
---
author: Nick Frichette
author_name: Nick Frichette
title: Connection Tracking
description: Abuse security group connection tracking to maintain persistence even when security group rules are changed.
hide:
Expand Down
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
---
author: Nick Frichette
author_name: Nick Frichette
title: Create a Console Session from IAM Credentials
description: "How to use IAM credentials to create an AWS Console session."
---
Expand Down
2 changes: 1 addition & 1 deletion content/aws/general-knowledge/iam-key-identifiers.md
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
---
author: Nick Frichette
author_name: Nick Frichette
title: IAM ID Identifiers
description: Chart of the IAM ID Prefixes.
hide:
Expand Down
2 changes: 1 addition & 1 deletion content/aws/general-knowledge/intro_metadata_service.md
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
---
author: Nick Frichette
author_name: Nick Frichette
title: Introduction to the Instance Metadata Service
description: An introduction to the Instance Metadata Service and how to access it.
---
Expand Down
2 changes: 1 addition & 1 deletion content/aws/general-knowledge/introduction_user_data.md
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
---
author: Nick Frichette
author_name: Nick Frichette
title: Introduction to User Data
description: An introduction to EC2 User Data and how to access it.
---
Expand Down
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
---
author: Nick Frichette
author_name: Nick Frichette
title: Using Stolen IAM Credentials
description: How to work with stolen IAM credentials and things to consider.
---
Expand Down
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
---
author: Nick Frichette
author_name: Nick Frichette
title: "Get IAM Credentials from a Console Session"
description: Convert access to the AWS Console into IAM credentials.
hide:
Expand Down
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
---
author: Nick Frichette
author_name: Nick Frichette
title: Intercept SSM Communications
description: With access to an EC2 instance you can intercept, modify, and spoof SSM communications.
---
Expand Down
2 changes: 1 addition & 1 deletion content/aws/post_exploitation/lambda_persistence.md
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
---
author: Nick Frichette
author_name: Nick Frichette
title: Lambda Persistence
description: How to establish persistence on a Lambda function after getting remote code execution.
---
Expand Down
2 changes: 1 addition & 1 deletion content/aws/post_exploitation/role-chain-juggling.md
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
---
author: Nick Frichette
author_name: Nick Frichette
title: Role Chain Juggling
description: Keep your access by chaining assume-role calls.
hide:
Expand Down
2 changes: 1 addition & 1 deletion content/aws/post_exploitation/run_shell_commands_on_ec2.md
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
---
author: Nick Frichette
author_name: Nick Frichette
title: "Run Shell Commands on EC2 with Send Command or Session Manager"
description: Leverage privileged access in an AWS account to run arbitrary commands on an EC2 instance.
---
Expand Down
2 changes: 1 addition & 1 deletion content/aws/post_exploitation/s3_acl_persistence.md
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
---
author: Wes Ladd
author_name: Wes Ladd
title: S3 File ACL Persistence
description: Maintain access to S3 resources by configuring Access Control Lists associated with S3 Buckets or Objects.
---
Expand Down
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
---
author: Nick Frichette
author_name: Nick Frichette
title: User Data Script Persistence
description: Maintain access to an EC2 instance and it's IAM role via user data scripts.
---
Expand Down
2 changes: 1 addition & 1 deletion content/azure/abusing-managed-identities.md
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
---
author: andrei8055
author_name: andrei8055
title: Abusing Managed Identities
description: Abusing Managed Identities
---
Expand Down
2 changes: 1 addition & 1 deletion content/azure/anonymous-blob-access.md
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
---
author: andrei8055
author_name: andrei8055
title: Anonymous Blob Access
description: Finding and accessing files stored in Azure Storage Accounts without authentication.
---
Expand Down
2 changes: 1 addition & 1 deletion content/azure/soft-deleted-blobs.md
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
---
author: andrei8055
author_name: andrei8055
title: Soft Deleted Blobs
description: Recovering and accessing files in private Storage Accounts that have been deleted.
---
Expand Down
2 changes: 1 addition & 1 deletion content/gcp/capture_the_flag/gcp-goat.md
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
---
author: Joshua Jebaraj
author_name: Joshua Jebaraj
title: GCP Goat
description: GCP Goat is the Vulnerable application for learning the GCP Security
hide:
Expand Down
2 changes: 1 addition & 1 deletion content/gcp/capture_the_flag/thunder_ctf.md
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
---
author: Aloïs THÉVENOT
author_name: Aloïs THÉVENOT
title: Thunder CTF
description: GCP themed CTF
---
Expand Down
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
---
author: Aloïs THÉVENOT
author_name: Aloïs THÉVENOT
title: Enumerate Service Account Permissions
description: Brute force the permissions of a service account to see what you have access to.
---
Expand Down
2 changes: 1 addition & 1 deletion content/gcp/exploitation/gcp-metadata-ssrf.md
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
---
author: Chris Moberly
author_name: Chris Moberly
title: Steal an OAuth Token via SSRF
description: Using SSRF to steal OAuth Tokens from a GCP hosted VM.
hide:
Expand Down
2 changes: 1 addition & 1 deletion content/gcp/exploitation/gcp-priv-esc.md
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
---
author: Chris Moberly
author_name: Chris Moberly
title: GCP Privilege Escalation
description: Common privilege escalation techniques in GCP.
---
Expand Down
2 changes: 1 addition & 1 deletion content/gcp/exploitation/gcp_iam_privilege_escalation.md
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
---
author: Aloïs THÉVENOT
author_name: Aloïs THÉVENOT
title: Privilege Escalation in Google Cloud Platform
description: Privilege escalation techniques for Google Cloud Platform (GCP)
hide:
Expand Down
2 changes: 1 addition & 1 deletion content/gcp/exploitation/local-priv-esc-metadata.md
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
---
author: Chris Moberly
author_name: Chris Moberly
title: "Local Privilege Escalation: Modifying the Metadata"
description: Escalating privileges on a VM via instance metadata.
---
Expand Down
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
---
author: Chris Moberly
author_name: Chris Moberly
title: Client Credential Search Order
description: The order by which GCP client libraries search for credentials.
---
Expand Down
2 changes: 1 addition & 1 deletion content/gcp/general-knowledge/default-account-names.md
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
---
author: Moses Frost (@mosesrenegade)
author_name: Moses Frost (@mosesrenegade)
title: Default Account Information
description: Default information on how accounts and service accounts exist in GCP
---
Expand Down
2 changes: 1 addition & 1 deletion content/gcp/general-knowledge/gcp-buckets.md
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
---
author: Moses Frost (@mosesrenegade)
author_name: Moses Frost (@mosesrenegade)
title: Hunting GCP Buckets
description: How to find valid and invalid GCP Buckets using tools
hide:
Expand Down
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
---
author: Jan Slezak
author_name: Jan Slezak
title: Metadata in Google Cloud Instances
description: Information about the data an attacker can access via GCP's API endpoints
hide:
Expand Down
2 changes: 1 addition & 1 deletion content/gcp/general-knowledge/security-and-constraints.md
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
---
author: Moses Frost (@mosesrenegade)
author_name: Moses Frost (@mosesrenegade)
title: Security and Constraints
description: Security considerations and constraints that are unique to GCP
---
Expand Down
2 changes: 1 addition & 1 deletion content/gcp/general-knowledge/security-concepts.md
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
---
author: Chris Moberly
author_name: Chris Moberly
title: Security Concepts
description: Common security concepts in GCP.
---
Expand Down
2 changes: 1 addition & 1 deletion content/gcp/post_exploitation/lateral-movement.md
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
---
author: Chris Moberly
author_name: Chris Moberly
title: Lateral Movement
description: Common lateral movement techniques in GCP.
---
Expand Down
Loading

0 comments on commit 03ac0b2

Please sign in to comment.