From e8efe83f3ff726a47222e9af3173282a8a29b5dc Mon Sep 17 00:00:00 2001 From: Nick Frichette Date: Thu, 1 Dec 2022 20:06:36 -0600 Subject: [PATCH] Changed author tag to author_name --- CONTRIBUTING.md | 2 +- content/aws/avoiding-detection/guardduty-pentest.md | 2 +- content/aws/avoiding-detection/guardduty-tor-client.md | 2 +- content/aws/avoiding-detection/modify-guardduty-config.md | 2 +- content/aws/avoiding-detection/steal-keys-undetected.md | 2 +- content/aws/capture_the_flag/cicdont.md | 2 +- content/aws/deprecated/stealth_perm_enum.md | 2 +- content/aws/deprecated/whoami.md | 2 +- content/aws/enumeration/account_id_from_ec2.md | 2 +- content/aws/enumeration/account_id_from_s3_bucket.md | 2 +- content/aws/enumeration/brute_force_iam_permissions.md | 2 +- content/aws/enumeration/enum_iam_user_role.md | 2 +- content/aws/enumeration/get-account-id-from-keys.md | 2 +- content/aws/enumeration/whoami.md | 2 +- .../Misconfigured_Resource-Based_Policies/index.md | 2 +- .../misconfigured_ecr_resource_policy.md | 4 ++-- content/aws/exploitation/abusing-container-registry.md | 2 +- content/aws/exploitation/ec2-metadata-ssrf.md | 2 +- content/aws/exploitation/iam_privilege_escalation.md | 2 +- content/aws/exploitation/lambda-steal-iam-credentials.md | 2 +- content/aws/exploitation/local-priv-esc-mod-instance-att.md | 2 +- content/aws/exploitation/local-priv-esc-user-data-s3.md | 2 +- .../orphaned_ cloudfront_or_dns_takeover_via_s3.md | 2 +- .../exploitation/route53_modification_privilege_escalation.md | 2 +- content/aws/general-knowledge/aws_organizations_defaults.md | 2 +- content/aws/general-knowledge/connection-tracking.md | 2 +- .../create_a_console_session_from_iam_credentials.md | 2 +- content/aws/general-knowledge/iam-key-identifiers.md | 2 +- content/aws/general-knowledge/intro_metadata_service.md | 2 +- content/aws/general-knowledge/introduction_user_data.md | 2 +- content/aws/general-knowledge/using_stolen_iam_credentials.md | 2 +- .../post_exploitation/get_iam_creds_from_console_session.md | 2 +- content/aws/post_exploitation/intercept_ssm_communications.md | 2 +- content/aws/post_exploitation/lambda_persistence.md | 2 +- content/aws/post_exploitation/role-chain-juggling.md | 2 +- content/aws/post_exploitation/run_shell_commands_on_ec2.md | 2 +- content/aws/post_exploitation/s3_acl_persistence.md | 2 +- content/aws/post_exploitation/user_data_script_persistence.md | 2 +- content/azure/abusing-managed-identities.md | 2 +- content/azure/anonymous-blob-access.md | 2 +- content/azure/soft-deleted-blobs.md | 2 +- content/gcp/capture_the_flag/gcp-goat.md | 2 +- content/gcp/capture_the_flag/thunder_ctf.md | 2 +- .../gcp/enumeration/enumerate_service_account_permissions.md | 2 +- content/gcp/exploitation/gcp-metadata-ssrf.md | 2 +- content/gcp/exploitation/gcp-priv-esc.md | 2 +- content/gcp/exploitation/gcp_iam_privilege_escalation.md | 2 +- content/gcp/exploitation/local-priv-esc-metadata.md | 2 +- .../gcp/general-knowledge/client-credential-search-order.md | 2 +- content/gcp/general-knowledge/default-account-names.md | 2 +- content/gcp/general-knowledge/gcp-buckets.md | 2 +- .../general-knowledge/metadata_in_google_cloud_instances.md | 2 +- content/gcp/general-knowledge/security-and-constraints.md | 2 +- content/gcp/general-knowledge/security-concepts.md | 2 +- content/gcp/post_exploitation/lateral-movement.md | 2 +- content/gcp/post_exploitation/treasure_hunting.md | 2 +- content/gcp/tools/gcloud.md | 2 +- content/terraform/terraform_ansi_escape_evasion.md | 4 ++-- content/terraform/terraform_enterprise_metadata_service.md | 2 +- overrides/main.html | 4 ++-- 60 files changed, 63 insertions(+), 63 deletions(-) diff --git a/CONTRIBUTING.md b/CONTRIBUTING.md index 82090000..50f9f199 100644 --- a/CONTRIBUTING.md +++ b/CONTRIBUTING.md @@ -38,7 +38,7 @@ After creating the file, please put the following at the top and fill it out. ``` --- -author: +author_name: title: description: --- diff --git a/content/aws/avoiding-detection/guardduty-pentest.md b/content/aws/avoiding-detection/guardduty-pentest.md index c9ece1f0..defb9b3d 100644 --- a/content/aws/avoiding-detection/guardduty-pentest.md +++ b/content/aws/avoiding-detection/guardduty-pentest.md @@ -1,5 +1,5 @@ --- -author: Nick Frichette +author_name: Nick Frichette title: Bypass GuardDuty Pentest Findings description: Prevent Kali Linux, ParrotOS, and Pentoo Linux from throwing GuardDuty alerts by modifying the User Agent string. hide: diff --git a/content/aws/avoiding-detection/guardduty-tor-client.md b/content/aws/avoiding-detection/guardduty-tor-client.md index e9134d7b..a979ef84 100644 --- a/content/aws/avoiding-detection/guardduty-tor-client.md +++ b/content/aws/avoiding-detection/guardduty-tor-client.md @@ -1,5 +1,5 @@ --- -author: Nick Frichette +author_name: Nick Frichette title: "Bypass GuardDuty Tor Client Findings" description: Connect to the Tor network from an EC2 instance without alerting GuardDuty. hide: diff --git a/content/aws/avoiding-detection/modify-guardduty-config.md b/content/aws/avoiding-detection/modify-guardduty-config.md index 5b30d764..a23284fe 100644 --- a/content/aws/avoiding-detection/modify-guardduty-config.md +++ b/content/aws/avoiding-detection/modify-guardduty-config.md @@ -1,5 +1,5 @@ --- -author: Ben Leembruggen +author_name: Ben Leembruggen title: Modify GuardDuty Configuration description: Modify existing GuardDuty configurations in the target account to hinder alerting and remediation capabilities. --- diff --git a/content/aws/avoiding-detection/steal-keys-undetected.md b/content/aws/avoiding-detection/steal-keys-undetected.md index 00711663..8970ae4f 100644 --- a/content/aws/avoiding-detection/steal-keys-undetected.md +++ b/content/aws/avoiding-detection/steal-keys-undetected.md @@ -1,5 +1,5 @@ --- -author: Nick Frichette +author_name: Nick Frichette title: Bypass Credential Exfiltration Detection description: When stealing IAM credentials from an EC2 instance you can avoid a GuardDuty detection by using VPC Endpoints. hide: diff --git a/content/aws/capture_the_flag/cicdont.md b/content/aws/capture_the_flag/cicdont.md index 5b3509d2..0e6fd794 100644 --- a/content/aws/capture_the_flag/cicdont.md +++ b/content/aws/capture_the_flag/cicdont.md @@ -1,5 +1,5 @@ --- -author: Nick Frichette +author_name: Nick Frichette title: CI/CDon't description: An AWS/GitLab CICD themed CTF. --- diff --git a/content/aws/deprecated/stealth_perm_enum.md b/content/aws/deprecated/stealth_perm_enum.md index fbb4db3e..80831478 100644 --- a/content/aws/deprecated/stealth_perm_enum.md +++ b/content/aws/deprecated/stealth_perm_enum.md @@ -1,5 +1,5 @@ --- -author: Nick Frichette +author_name: Nick Frichette title: Enumerate Permissions without Logging to CloudTrail description: Leverage a bug in the AWS API to enumerate permissions for a role without logging to CloudTrail and alerting the Blue Team. hide: diff --git a/content/aws/deprecated/whoami.md b/content/aws/deprecated/whoami.md index 02ba23a9..84ef02c2 100644 --- a/content/aws/deprecated/whoami.md +++ b/content/aws/deprecated/whoami.md @@ -1,5 +1,5 @@ --- -author: Nick Frichette +author_name: Nick Frichette title: Whoami - Get Principal Name From Keys description: During an assessment you may find AWS IAM credentials. Use these tactics to identify the principal of the keys. hide: diff --git a/content/aws/enumeration/account_id_from_ec2.md b/content/aws/enumeration/account_id_from_ec2.md index b77bea15..26119ab3 100644 --- a/content/aws/enumeration/account_id_from_ec2.md +++ b/content/aws/enumeration/account_id_from_ec2.md @@ -1,5 +1,5 @@ --- -author: Phil Massyn +author_name: Phil Massyn title: Enumerate AWS Account ID from an EC2 Instance description: With access to an ec2 instance, you will be able to identify the AWS account it runs in. --- diff --git a/content/aws/enumeration/account_id_from_s3_bucket.md b/content/aws/enumeration/account_id_from_s3_bucket.md index ed1198f5..61281ab7 100644 --- a/content/aws/enumeration/account_id_from_s3_bucket.md +++ b/content/aws/enumeration/account_id_from_s3_bucket.md @@ -1,5 +1,5 @@ --- -author: Nick Frichette +author_name: Nick Frichette title: Enumerate AWS Account ID from a Public S3 Bucket description: Knowing only the name of a public S3 bucket, you can ascertain the account ID it resides in. --- diff --git a/content/aws/enumeration/brute_force_iam_permissions.md b/content/aws/enumeration/brute_force_iam_permissions.md index 480a6241..1df5409c 100644 --- a/content/aws/enumeration/brute_force_iam_permissions.md +++ b/content/aws/enumeration/brute_force_iam_permissions.md @@ -1,5 +1,5 @@ --- -author: Nick Frichette +author_name: Nick Frichette title: Brute Force IAM Permissions description: Brute force the IAM permissions of a user or role to see what you have access to. --- diff --git a/content/aws/enumeration/enum_iam_user_role.md b/content/aws/enumeration/enum_iam_user_role.md index 234e7e28..a41bf9fb 100644 --- a/content/aws/enumeration/enum_iam_user_role.md +++ b/content/aws/enumeration/enum_iam_user_role.md @@ -1,5 +1,5 @@ --- -author: Nick Frichette +author_name: Nick Frichette title: Unauthenticated Enumeration of IAM Users and Roles description: Leverage cross account behaviors to enumerate IAM users and roles in a different AWS account without authentication. hide: diff --git a/content/aws/enumeration/get-account-id-from-keys.md b/content/aws/enumeration/get-account-id-from-keys.md index 3d945c8f..851827b2 100644 --- a/content/aws/enumeration/get-account-id-from-keys.md +++ b/content/aws/enumeration/get-account-id-from-keys.md @@ -1,5 +1,5 @@ --- -author: Nick Frichette +author_name: Nick Frichette title: Get Account ID from AWS Access Keys description: During an assessment you may find AWS IAM credentials but not know what account they are associated with. Use this to get the account ID. hide: diff --git a/content/aws/enumeration/whoami.md b/content/aws/enumeration/whoami.md index a7d30d8c..9c099740 100644 --- a/content/aws/enumeration/whoami.md +++ b/content/aws/enumeration/whoami.md @@ -1,5 +1,5 @@ --- -author: Nick Frichette +author_name: Nick Frichette title: Whoami - Get Principal Name From Keys description: During an assessment you may find AWS IAM credentials. Use these tactics to identify the principal of the keys. --- diff --git a/content/aws/exploitation/Misconfigured_Resource-Based_Policies/index.md b/content/aws/exploitation/Misconfigured_Resource-Based_Policies/index.md index cc8a5267..bffa4d2d 100644 --- a/content/aws/exploitation/Misconfigured_Resource-Based_Policies/index.md +++ b/content/aws/exploitation/Misconfigured_Resource-Based_Policies/index.md @@ -1,5 +1,5 @@ --- -author: Nick Frichette +author_name: Nick Frichette title: Misconfigured Resource-Based Policies description: Common misconfigurations of resource-based policies and how they can be abused. --- diff --git a/content/aws/exploitation/Misconfigured_Resource-Based_Policies/misconfigured_ecr_resource_policy.md b/content/aws/exploitation/Misconfigured_Resource-Based_Policies/misconfigured_ecr_resource_policy.md index 47b83188..a9817871 100644 --- a/content/aws/exploitation/Misconfigured_Resource-Based_Policies/misconfigured_ecr_resource_policy.md +++ b/content/aws/exploitation/Misconfigured_Resource-Based_Policies/misconfigured_ecr_resource_policy.md @@ -1,5 +1,5 @@ --- -author: Nick Frichette +author_name: Nick Frichette title: Abusing Misconfigured ECR Resource Policies description: How to take advantage of misconfigured AWS ECR private repositories. --- @@ -139,4 +139,4 @@ Account 009619941490 Scan Results (severity columns are for fails only): ``` !!! Note - `Condition` elements may induce false positives. \ No newline at end of file + `Condition` elements may induce false positives. diff --git a/content/aws/exploitation/abusing-container-registry.md b/content/aws/exploitation/abusing-container-registry.md index af022e18..ef859976 100644 --- a/content/aws/exploitation/abusing-container-registry.md +++ b/content/aws/exploitation/abusing-container-registry.md @@ -1,5 +1,5 @@ --- -author: Roi Lavie +author_name: Roi Lavie title: Abusing Elastic Container Registry for Lateral Movement description: With ECR permissions you can easily distribute a backdoor to production servers, developer's laptops, or CI/CD pipelines and own the environment by gaining privileged permissions. hide: diff --git a/content/aws/exploitation/ec2-metadata-ssrf.md b/content/aws/exploitation/ec2-metadata-ssrf.md index 7df59905..ff1ddf6e 100644 --- a/content/aws/exploitation/ec2-metadata-ssrf.md +++ b/content/aws/exploitation/ec2-metadata-ssrf.md @@ -1,5 +1,5 @@ --- -author: Nick Frichette +author_name: Nick Frichette title: Steal EC2 Metadata Credentials via SSRF description: Old faithful; How to steal IAM Role credentials from the EC2 Metadata service via SSRF. hide: diff --git a/content/aws/exploitation/iam_privilege_escalation.md b/content/aws/exploitation/iam_privilege_escalation.md index 7d717fa9..eed30020 100644 --- a/content/aws/exploitation/iam_privilege_escalation.md +++ b/content/aws/exploitation/iam_privilege_escalation.md @@ -1,5 +1,5 @@ --- -author: Nick Frichette +author_name: Nick Frichette title: AWS IAM Privilege Escalation Techniques description: Common techniques that can be leveraged to escalate privileges in an AWS account. --- diff --git a/content/aws/exploitation/lambda-steal-iam-credentials.md b/content/aws/exploitation/lambda-steal-iam-credentials.md index 8db34267..7f5c95f2 100644 --- a/content/aws/exploitation/lambda-steal-iam-credentials.md +++ b/content/aws/exploitation/lambda-steal-iam-credentials.md @@ -1,5 +1,5 @@ --- -author: Nick Frichette +author_name: Nick Frichette title: Steal IAM Credentials and Event Data from Lambda description: Leverage file read and SSRF vulnerabilities to steam IAM credentials and event data from Lambda. hide: diff --git a/content/aws/exploitation/local-priv-esc-mod-instance-att.md b/content/aws/exploitation/local-priv-esc-mod-instance-att.md index b96d37ec..fd27f281 100644 --- a/content/aws/exploitation/local-priv-esc-mod-instance-att.md +++ b/content/aws/exploitation/local-priv-esc-mod-instance-att.md @@ -1,5 +1,5 @@ --- -author: Nick Frichette +author_name: Nick Frichette title: "Local Privilege Escalation: User Data" description: Escalate privileges on an EC2 instance by modifying the user-data scripts with modify-instance-attribute. hide: diff --git a/content/aws/exploitation/local-priv-esc-user-data-s3.md b/content/aws/exploitation/local-priv-esc-user-data-s3.md index c3260c4e..4102257d 100644 --- a/content/aws/exploitation/local-priv-esc-user-data-s3.md +++ b/content/aws/exploitation/local-priv-esc-user-data-s3.md @@ -1,5 +1,5 @@ --- -author: Nick Frichette +author_name: Nick Frichette title: "Local Privilege Escalation: User Data 2" description: Escalate privileges on an EC2 instance by modifying scripts and packages called by user data. hide: diff --git a/content/aws/exploitation/orphaned_ cloudfront_or_dns_takeover_via_s3.md b/content/aws/exploitation/orphaned_ cloudfront_or_dns_takeover_via_s3.md index 23fee374..fc02a149 100644 --- a/content/aws/exploitation/orphaned_ cloudfront_or_dns_takeover_via_s3.md +++ b/content/aws/exploitation/orphaned_ cloudfront_or_dns_takeover_via_s3.md @@ -1,5 +1,5 @@ --- -author: Houston Hopkins +author_name: Houston Hopkins title: Simple Route53/Cloudfront/S3 Subdomain Takeover description: Techniques for taking over subdomains or hostnames that use Cloudfront and/or a DNS record to serve content from Amazon S3. hide: diff --git a/content/aws/exploitation/route53_modification_privilege_escalation.md b/content/aws/exploitation/route53_modification_privilege_escalation.md index 4b435165..3c9228ce 100644 --- a/content/aws/exploitation/route53_modification_privilege_escalation.md +++ b/content/aws/exploitation/route53_modification_privilege_escalation.md @@ -1,5 +1,5 @@ --- -author: Patryk Bogusz +author_name: Patryk Bogusz title: AWS API Call Hijacking via ACM-PCA description: By modifying the route53 entries and utilizing the acm-pca private CA one can hijack the calls to AWS API inside the AWS VPC hide: diff --git a/content/aws/general-knowledge/aws_organizations_defaults.md b/content/aws/general-knowledge/aws_organizations_defaults.md index 46b61c40..a5a75abb 100644 --- a/content/aws/general-knowledge/aws_organizations_defaults.md +++ b/content/aws/general-knowledge/aws_organizations_defaults.md @@ -1,5 +1,5 @@ --- -author: Nick Frichette +author_name: Nick Frichette title: AWS Organizations Defaults description: AWS Organizations is a common service to run into in AWS environments. It's default behavior can make it a target for attackers. --- diff --git a/content/aws/general-knowledge/connection-tracking.md b/content/aws/general-knowledge/connection-tracking.md index fd4481f9..167c2eae 100644 --- a/content/aws/general-knowledge/connection-tracking.md +++ b/content/aws/general-knowledge/connection-tracking.md @@ -1,5 +1,5 @@ --- -author: Nick Frichette +author_name: Nick Frichette title: Connection Tracking description: Abuse security group connection tracking to maintain persistence even when security group rules are changed. hide: diff --git a/content/aws/general-knowledge/create_a_console_session_from_iam_credentials.md b/content/aws/general-knowledge/create_a_console_session_from_iam_credentials.md index 8fd99f25..e71f2c36 100644 --- a/content/aws/general-knowledge/create_a_console_session_from_iam_credentials.md +++ b/content/aws/general-knowledge/create_a_console_session_from_iam_credentials.md @@ -1,5 +1,5 @@ --- -author: Nick Frichette +author_name: Nick Frichette title: Create a Console Session from IAM Credentials description: "How to use IAM credentials to create an AWS Console session." --- diff --git a/content/aws/general-knowledge/iam-key-identifiers.md b/content/aws/general-knowledge/iam-key-identifiers.md index 5ff8f3d2..6a1a38d8 100644 --- a/content/aws/general-knowledge/iam-key-identifiers.md +++ b/content/aws/general-knowledge/iam-key-identifiers.md @@ -1,5 +1,5 @@ --- -author: Nick Frichette +author_name: Nick Frichette title: IAM ID Identifiers description: Chart of the IAM ID Prefixes. hide: diff --git a/content/aws/general-knowledge/intro_metadata_service.md b/content/aws/general-knowledge/intro_metadata_service.md index a921801a..539377fd 100644 --- a/content/aws/general-knowledge/intro_metadata_service.md +++ b/content/aws/general-knowledge/intro_metadata_service.md @@ -1,5 +1,5 @@ --- -author: Nick Frichette +author_name: Nick Frichette title: Introduction to the Instance Metadata Service description: An introduction to the Instance Metadata Service and how to access it. --- diff --git a/content/aws/general-knowledge/introduction_user_data.md b/content/aws/general-knowledge/introduction_user_data.md index 8c7bd1be..6f1082f8 100644 --- a/content/aws/general-knowledge/introduction_user_data.md +++ b/content/aws/general-knowledge/introduction_user_data.md @@ -1,5 +1,5 @@ --- -author: Nick Frichette +author_name: Nick Frichette title: Introduction to User Data description: An introduction to EC2 User Data and how to access it. --- diff --git a/content/aws/general-knowledge/using_stolen_iam_credentials.md b/content/aws/general-knowledge/using_stolen_iam_credentials.md index ba9a47cb..a3e1cf60 100644 --- a/content/aws/general-knowledge/using_stolen_iam_credentials.md +++ b/content/aws/general-knowledge/using_stolen_iam_credentials.md @@ -1,5 +1,5 @@ --- -author: Nick Frichette +author_name: Nick Frichette title: Using Stolen IAM Credentials description: How to work with stolen IAM credentials and things to consider. --- diff --git a/content/aws/post_exploitation/get_iam_creds_from_console_session.md b/content/aws/post_exploitation/get_iam_creds_from_console_session.md index 02914b51..94ea455e 100644 --- a/content/aws/post_exploitation/get_iam_creds_from_console_session.md +++ b/content/aws/post_exploitation/get_iam_creds_from_console_session.md @@ -1,5 +1,5 @@ --- -author: Nick Frichette +author_name: Nick Frichette title: "Get IAM Credentials from a Console Session" description: Convert access to the AWS Console into IAM credentials. hide: diff --git a/content/aws/post_exploitation/intercept_ssm_communications.md b/content/aws/post_exploitation/intercept_ssm_communications.md index db06f031..5fe3cf65 100644 --- a/content/aws/post_exploitation/intercept_ssm_communications.md +++ b/content/aws/post_exploitation/intercept_ssm_communications.md @@ -1,5 +1,5 @@ --- -author: Nick Frichette +author_name: Nick Frichette title: Intercept SSM Communications description: With access to an EC2 instance you can intercept, modify, and spoof SSM communications. --- diff --git a/content/aws/post_exploitation/lambda_persistence.md b/content/aws/post_exploitation/lambda_persistence.md index 9ab449d0..726b3c1c 100644 --- a/content/aws/post_exploitation/lambda_persistence.md +++ b/content/aws/post_exploitation/lambda_persistence.md @@ -1,5 +1,5 @@ --- -author: Nick Frichette +author_name: Nick Frichette title: Lambda Persistence description: How to establish persistence on a Lambda function after getting remote code execution. --- diff --git a/content/aws/post_exploitation/role-chain-juggling.md b/content/aws/post_exploitation/role-chain-juggling.md index 6c8fde43..bdef70e0 100644 --- a/content/aws/post_exploitation/role-chain-juggling.md +++ b/content/aws/post_exploitation/role-chain-juggling.md @@ -1,5 +1,5 @@ --- -author: Nick Frichette +author_name: Nick Frichette title: Role Chain Juggling description: Keep your access by chaining assume-role calls. hide: diff --git a/content/aws/post_exploitation/run_shell_commands_on_ec2.md b/content/aws/post_exploitation/run_shell_commands_on_ec2.md index 0da800d4..1a6b6174 100644 --- a/content/aws/post_exploitation/run_shell_commands_on_ec2.md +++ b/content/aws/post_exploitation/run_shell_commands_on_ec2.md @@ -1,5 +1,5 @@ --- -author: Nick Frichette +author_name: Nick Frichette title: "Run Shell Commands on EC2 with Send Command or Session Manager" description: Leverage privileged access in an AWS account to run arbitrary commands on an EC2 instance. --- diff --git a/content/aws/post_exploitation/s3_acl_persistence.md b/content/aws/post_exploitation/s3_acl_persistence.md index ef321be6..f270a131 100644 --- a/content/aws/post_exploitation/s3_acl_persistence.md +++ b/content/aws/post_exploitation/s3_acl_persistence.md @@ -1,5 +1,5 @@ --- -author: Wes Ladd +author_name: Wes Ladd title: S3 File ACL Persistence description: Maintain access to S3 resources by configuring Access Control Lists associated with S3 Buckets or Objects. --- diff --git a/content/aws/post_exploitation/user_data_script_persistence.md b/content/aws/post_exploitation/user_data_script_persistence.md index d715964c..edc0bcc5 100644 --- a/content/aws/post_exploitation/user_data_script_persistence.md +++ b/content/aws/post_exploitation/user_data_script_persistence.md @@ -1,5 +1,5 @@ --- -author: Nick Frichette +author_name: Nick Frichette title: User Data Script Persistence description: Maintain access to an EC2 instance and it's IAM role via user data scripts. --- diff --git a/content/azure/abusing-managed-identities.md b/content/azure/abusing-managed-identities.md index 82927c82..0b9e2f39 100644 --- a/content/azure/abusing-managed-identities.md +++ b/content/azure/abusing-managed-identities.md @@ -1,5 +1,5 @@ --- -author: andrei8055 +author_name: andrei8055 title: Abusing Managed Identities description: Abusing Managed Identities --- diff --git a/content/azure/anonymous-blob-access.md b/content/azure/anonymous-blob-access.md index 2c13f492..d4e476d9 100644 --- a/content/azure/anonymous-blob-access.md +++ b/content/azure/anonymous-blob-access.md @@ -1,5 +1,5 @@ --- -author: andrei8055 +author_name: andrei8055 title: Anonymous Blob Access description: Finding and accessing files stored in Azure Storage Accounts without authentication. --- diff --git a/content/azure/soft-deleted-blobs.md b/content/azure/soft-deleted-blobs.md index 2465e009..620c34dd 100644 --- a/content/azure/soft-deleted-blobs.md +++ b/content/azure/soft-deleted-blobs.md @@ -1,5 +1,5 @@ --- -author: andrei8055 +author_name: andrei8055 title: Soft Deleted Blobs description: Recovering and accessing files in private Storage Accounts that have been deleted. --- diff --git a/content/gcp/capture_the_flag/gcp-goat.md b/content/gcp/capture_the_flag/gcp-goat.md index 1ebd4a60..6e87b0f7 100644 --- a/content/gcp/capture_the_flag/gcp-goat.md +++ b/content/gcp/capture_the_flag/gcp-goat.md @@ -1,5 +1,5 @@ --- -author: Joshua Jebaraj +author_name: Joshua Jebaraj title: GCP Goat description: GCP Goat is the Vulnerable application for learning the GCP Security hide: diff --git a/content/gcp/capture_the_flag/thunder_ctf.md b/content/gcp/capture_the_flag/thunder_ctf.md index ba73479f..5682759b 100644 --- a/content/gcp/capture_the_flag/thunder_ctf.md +++ b/content/gcp/capture_the_flag/thunder_ctf.md @@ -1,5 +1,5 @@ --- -author: Aloïs THÉVENOT +author_name: Aloïs THÉVENOT title: Thunder CTF description: GCP themed CTF --- diff --git a/content/gcp/enumeration/enumerate_service_account_permissions.md b/content/gcp/enumeration/enumerate_service_account_permissions.md index 118a264e..77316b31 100644 --- a/content/gcp/enumeration/enumerate_service_account_permissions.md +++ b/content/gcp/enumeration/enumerate_service_account_permissions.md @@ -1,5 +1,5 @@ --- -author: Aloïs THÉVENOT +author_name: Aloïs THÉVENOT title: Enumerate Service Account Permissions description: Brute force the permissions of a service account to see what you have access to. --- diff --git a/content/gcp/exploitation/gcp-metadata-ssrf.md b/content/gcp/exploitation/gcp-metadata-ssrf.md index e19ccee7..19a51d1f 100644 --- a/content/gcp/exploitation/gcp-metadata-ssrf.md +++ b/content/gcp/exploitation/gcp-metadata-ssrf.md @@ -1,5 +1,5 @@ --- -author: Chris Moberly +author_name: Chris Moberly title: Steal an OAuth Token via SSRF description: Using SSRF to steal OAuth Tokens from a GCP hosted VM. hide: diff --git a/content/gcp/exploitation/gcp-priv-esc.md b/content/gcp/exploitation/gcp-priv-esc.md index 3423ee14..1f7b43ac 100644 --- a/content/gcp/exploitation/gcp-priv-esc.md +++ b/content/gcp/exploitation/gcp-priv-esc.md @@ -1,5 +1,5 @@ --- -author: Chris Moberly +author_name: Chris Moberly title: GCP Privilege Escalation description: Common privilege escalation techniques in GCP. --- diff --git a/content/gcp/exploitation/gcp_iam_privilege_escalation.md b/content/gcp/exploitation/gcp_iam_privilege_escalation.md index 149fcbd1..68000318 100644 --- a/content/gcp/exploitation/gcp_iam_privilege_escalation.md +++ b/content/gcp/exploitation/gcp_iam_privilege_escalation.md @@ -1,5 +1,5 @@ --- -author: Aloïs THÉVENOT +author_name: Aloïs THÉVENOT title: Privilege Escalation in Google Cloud Platform description: Privilege escalation techniques for Google Cloud Platform (GCP) hide: diff --git a/content/gcp/exploitation/local-priv-esc-metadata.md b/content/gcp/exploitation/local-priv-esc-metadata.md index 13be4c9e..385127a4 100644 --- a/content/gcp/exploitation/local-priv-esc-metadata.md +++ b/content/gcp/exploitation/local-priv-esc-metadata.md @@ -1,5 +1,5 @@ --- -author: Chris Moberly +author_name: Chris Moberly title: "Local Privilege Escalation: Modifying the Metadata" description: Escalating privileges on a VM via instance metadata. --- diff --git a/content/gcp/general-knowledge/client-credential-search-order.md b/content/gcp/general-knowledge/client-credential-search-order.md index 847a1c09..d2ba7907 100644 --- a/content/gcp/general-knowledge/client-credential-search-order.md +++ b/content/gcp/general-knowledge/client-credential-search-order.md @@ -1,5 +1,5 @@ --- -author: Chris Moberly +author_name: Chris Moberly title: Client Credential Search Order description: The order by which GCP client libraries search for credentials. --- diff --git a/content/gcp/general-knowledge/default-account-names.md b/content/gcp/general-knowledge/default-account-names.md index 2fed737d..f466dcee 100644 --- a/content/gcp/general-knowledge/default-account-names.md +++ b/content/gcp/general-knowledge/default-account-names.md @@ -1,5 +1,5 @@ --- -author: Moses Frost (@mosesrenegade) +author_name: Moses Frost (@mosesrenegade) title: Default Account Information description: Default information on how accounts and service accounts exist in GCP --- diff --git a/content/gcp/general-knowledge/gcp-buckets.md b/content/gcp/general-knowledge/gcp-buckets.md index b26f56b7..a540977d 100644 --- a/content/gcp/general-knowledge/gcp-buckets.md +++ b/content/gcp/general-knowledge/gcp-buckets.md @@ -1,5 +1,5 @@ --- -author: Moses Frost (@mosesrenegade) +author_name: Moses Frost (@mosesrenegade) title: Hunting GCP Buckets description: How to find valid and invalid GCP Buckets using tools hide: diff --git a/content/gcp/general-knowledge/metadata_in_google_cloud_instances.md b/content/gcp/general-knowledge/metadata_in_google_cloud_instances.md index 832c2ddc..e960e937 100644 --- a/content/gcp/general-knowledge/metadata_in_google_cloud_instances.md +++ b/content/gcp/general-knowledge/metadata_in_google_cloud_instances.md @@ -1,5 +1,5 @@ --- -author: Jan Slezak +author_name: Jan Slezak title: Metadata in Google Cloud Instances description: Information about the data an attacker can access via GCP's API endpoints hide: diff --git a/content/gcp/general-knowledge/security-and-constraints.md b/content/gcp/general-knowledge/security-and-constraints.md index 42c8d7ef..dba07a08 100644 --- a/content/gcp/general-knowledge/security-and-constraints.md +++ b/content/gcp/general-knowledge/security-and-constraints.md @@ -1,5 +1,5 @@ --- -author: Moses Frost (@mosesrenegade) +author_name: Moses Frost (@mosesrenegade) title: Security and Constraints description: Security considerations and constraints that are unique to GCP --- diff --git a/content/gcp/general-knowledge/security-concepts.md b/content/gcp/general-knowledge/security-concepts.md index 523420fb..9708a05a 100644 --- a/content/gcp/general-knowledge/security-concepts.md +++ b/content/gcp/general-knowledge/security-concepts.md @@ -1,5 +1,5 @@ --- -author: Chris Moberly +author_name: Chris Moberly title: Security Concepts description: Common security concepts in GCP. --- diff --git a/content/gcp/post_exploitation/lateral-movement.md b/content/gcp/post_exploitation/lateral-movement.md index ae1366a5..c057a727 100644 --- a/content/gcp/post_exploitation/lateral-movement.md +++ b/content/gcp/post_exploitation/lateral-movement.md @@ -1,5 +1,5 @@ --- -author: Chris Moberly +author_name: Chris Moberly title: Lateral Movement description: Common lateral movement techniques in GCP. --- diff --git a/content/gcp/post_exploitation/treasure_hunting.md b/content/gcp/post_exploitation/treasure_hunting.md index f73b1878..5fcefb2d 100644 --- a/content/gcp/post_exploitation/treasure_hunting.md +++ b/content/gcp/post_exploitation/treasure_hunting.md @@ -1,5 +1,5 @@ --- -author: Chris Moberly +author_name: Chris Moberly title: Treasure hunting description: The following sections detail tactics to view and exfiltrate data from various Google services.. --- diff --git a/content/gcp/tools/gcloud.md b/content/gcp/tools/gcloud.md index 389267c3..f7423a8f 100644 --- a/content/gcp/tools/gcloud.md +++ b/content/gcp/tools/gcloud.md @@ -1,5 +1,5 @@ --- -author: Chris Moberly +author_name: Chris Moberly title: Google Cloud CLI description: Google Cloud CLI used to create and manage Google Cloud resources. hide: diff --git a/content/terraform/terraform_ansi_escape_evasion.md b/content/terraform/terraform_ansi_escape_evasion.md index eb7235b4..933ec214 100644 --- a/content/terraform/terraform_ansi_escape_evasion.md +++ b/content/terraform/terraform_ansi_escape_evasion.md @@ -1,5 +1,5 @@ --- -author: Nick Frichette +author_name: Nick Frichette title: Terraform ANSI Escape description: Using ANSI Escape Sequences to Hide Malicious Terraform Code hide: @@ -51,4 +51,4 @@ resource "null_resource" "blah" { And this is the output: -![Modified Output](/images/terraform/terraform_ansi_escape_evasion/modified_output.png) \ No newline at end of file +![Modified Output](/images/terraform/terraform_ansi_escape_evasion/modified_output.png) diff --git a/content/terraform/terraform_enterprise_metadata_service.md b/content/terraform/terraform_enterprise_metadata_service.md index d0f0b801..418fd7c4 100644 --- a/content/terraform/terraform_enterprise_metadata_service.md +++ b/content/terraform/terraform_enterprise_metadata_service.md @@ -1,5 +1,5 @@ --- -author: Nick Frichette +author_name: Nick Frichette title: "Terraform Enterprise: Attack the Metadata Service" description: Leverage a default configuration in Terraform Enterprise to steal credentials from the Metadata Service --- diff --git a/overrides/main.html b/overrides/main.html index dedc4750..2ec29fb4 100644 --- a/overrides/main.html +++ b/overrides/main.html @@ -13,8 +13,8 @@ {% endblock %} {% block content %} - {% if page.meta.author %} -

Article by {{ page.meta.author }}.

+ {% if page.meta.author_name %} +

Article by {{ page.meta.author_name }}.

{% endif %} {{ super() }} {% endblock %}