Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Changed author tag to author_name #223

Merged
merged 1 commit into from
Dec 2, 2022
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
2 changes: 1 addition & 1 deletion CONTRIBUTING.md
Original file line number Diff line number Diff line change
Expand Up @@ -38,7 +38,7 @@ After creating the file, please put the following at the top and fill it out.

```
---
author: <Your Name>
author_name: <Your Name>
title: <Page Title>
description: <A description of the page>
---
Expand Down
2 changes: 1 addition & 1 deletion content/aws/avoiding-detection/guardduty-pentest.md
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
---
author: Nick Frichette
author_name: Nick Frichette
title: Bypass GuardDuty Pentest Findings
description: Prevent Kali Linux, ParrotOS, and Pentoo Linux from throwing GuardDuty alerts by modifying the User Agent string.
hide:
Expand Down
2 changes: 1 addition & 1 deletion content/aws/avoiding-detection/guardduty-tor-client.md
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
---
author: Nick Frichette
author_name: Nick Frichette
title: "Bypass GuardDuty Tor Client Findings"
description: Connect to the Tor network from an EC2 instance without alerting GuardDuty.
hide:
Expand Down
2 changes: 1 addition & 1 deletion content/aws/avoiding-detection/modify-guardduty-config.md
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
---
author: Ben Leembruggen
author_name: Ben Leembruggen
title: Modify GuardDuty Configuration
description: Modify existing GuardDuty configurations in the target account to hinder alerting and remediation capabilities.
---
Expand Down
2 changes: 1 addition & 1 deletion content/aws/avoiding-detection/steal-keys-undetected.md
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
---
author: Nick Frichette
author_name: Nick Frichette
title: Bypass Credential Exfiltration Detection
description: When stealing IAM credentials from an EC2 instance you can avoid a GuardDuty detection by using VPC Endpoints.
hide:
Expand Down
2 changes: 1 addition & 1 deletion content/aws/capture_the_flag/cicdont.md
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
---
author: Nick Frichette
author_name: Nick Frichette
title: CI/CDon't
description: An AWS/GitLab CICD themed CTF.
---
Expand Down
2 changes: 1 addition & 1 deletion content/aws/deprecated/stealth_perm_enum.md
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
---
author: Nick Frichette
author_name: Nick Frichette
title: Enumerate Permissions without Logging to CloudTrail
description: Leverage a bug in the AWS API to enumerate permissions for a role without logging to CloudTrail and alerting the Blue Team.
hide:
Expand Down
2 changes: 1 addition & 1 deletion content/aws/deprecated/whoami.md
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
---
author: Nick Frichette
author_name: Nick Frichette
title: Whoami - Get Principal Name From Keys
description: During an assessment you may find AWS IAM credentials. Use these tactics to identify the principal of the keys.
hide:
Expand Down
2 changes: 1 addition & 1 deletion content/aws/enumeration/account_id_from_ec2.md
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
---
author: Phil Massyn
author_name: Phil Massyn
title: Enumerate AWS Account ID from an EC2 Instance
description: With access to an ec2 instance, you will be able to identify the AWS account it runs in.
---
Expand Down
2 changes: 1 addition & 1 deletion content/aws/enumeration/account_id_from_s3_bucket.md
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
---
author: Nick Frichette
author_name: Nick Frichette
title: Enumerate AWS Account ID from a Public S3 Bucket
description: Knowing only the name of a public S3 bucket, you can ascertain the account ID it resides in.
---
Expand Down
2 changes: 1 addition & 1 deletion content/aws/enumeration/brute_force_iam_permissions.md
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
---
author: Nick Frichette
author_name: Nick Frichette
title: Brute Force IAM Permissions
description: Brute force the IAM permissions of a user or role to see what you have access to.
---
Expand Down
2 changes: 1 addition & 1 deletion content/aws/enumeration/enum_iam_user_role.md
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
---
author: Nick Frichette
author_name: Nick Frichette
title: Unauthenticated Enumeration of IAM Users and Roles
description: Leverage cross account behaviors to enumerate IAM users and roles in a different AWS account without authentication.
hide:
Expand Down
2 changes: 1 addition & 1 deletion content/aws/enumeration/get-account-id-from-keys.md
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
---
author: Nick Frichette
author_name: Nick Frichette
title: Get Account ID from AWS Access Keys
description: During an assessment you may find AWS IAM credentials but not know what account they are associated with. Use this to get the account ID.
hide:
Expand Down
2 changes: 1 addition & 1 deletion content/aws/enumeration/whoami.md
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
---
author: Nick Frichette
author_name: Nick Frichette
title: Whoami - Get Principal Name From Keys
description: During an assessment you may find AWS IAM credentials. Use these tactics to identify the principal of the keys.
---
Expand Down
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
---
author: Nick Frichette
author_name: Nick Frichette
title: Misconfigured Resource-Based Policies
description: Common misconfigurations of resource-based policies and how they can be abused.
---
Expand Down
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
---
author: Nick Frichette
author_name: Nick Frichette
title: Abusing Misconfigured ECR Resource Policies
description: How to take advantage of misconfigured AWS ECR private repositories.
---
Expand Down Expand Up @@ -139,4 +139,4 @@ Account 009619941490 Scan Results (severity columns are for fails only):
```

!!! Note
`Condition` elements may induce false positives.
`Condition` elements may induce false positives.
2 changes: 1 addition & 1 deletion content/aws/exploitation/abusing-container-registry.md
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
---
author: Roi Lavie
author_name: Roi Lavie
title: Abusing Elastic Container Registry for Lateral Movement
description: With ECR permissions you can easily distribute a backdoor to production servers, developer's laptops, or CI/CD pipelines and own the environment by gaining privileged permissions.
hide:
Expand Down
2 changes: 1 addition & 1 deletion content/aws/exploitation/ec2-metadata-ssrf.md
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
---
author: Nick Frichette
author_name: Nick Frichette
title: Steal EC2 Metadata Credentials via SSRF
description: Old faithful; How to steal IAM Role credentials from the EC2 Metadata service via SSRF.
hide:
Expand Down
2 changes: 1 addition & 1 deletion content/aws/exploitation/iam_privilege_escalation.md
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
---
author: Nick Frichette
author_name: Nick Frichette
title: AWS IAM Privilege Escalation Techniques
description: Common techniques that can be leveraged to escalate privileges in an AWS account.
---
Expand Down
2 changes: 1 addition & 1 deletion content/aws/exploitation/lambda-steal-iam-credentials.md
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
---
author: Nick Frichette
author_name: Nick Frichette
title: Steal IAM Credentials and Event Data from Lambda
description: Leverage file read and SSRF vulnerabilities to steam IAM credentials and event data from Lambda.
hide:
Expand Down
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
---
author: Nick Frichette
author_name: Nick Frichette
title: "Local Privilege Escalation: User Data"
description: Escalate privileges on an EC2 instance by modifying the user-data scripts with modify-instance-attribute.
hide:
Expand Down
2 changes: 1 addition & 1 deletion content/aws/exploitation/local-priv-esc-user-data-s3.md
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
---
author: Nick Frichette
author_name: Nick Frichette
title: "Local Privilege Escalation: User Data 2"
description: Escalate privileges on an EC2 instance by modifying scripts and packages called by user data.
hide:
Expand Down
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
---
author: Houston Hopkins
author_name: Houston Hopkins
title: Simple Route53/Cloudfront/S3 Subdomain Takeover
description: Techniques for taking over subdomains or hostnames that use Cloudfront and/or a DNS record to serve content from Amazon S3.
hide:
Expand Down
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
---
author: Patryk Bogusz
author_name: Patryk Bogusz
title: AWS API Call Hijacking via ACM-PCA
description: By modifying the route53 entries and utilizing the acm-pca private CA one can hijack the calls to AWS API inside the AWS VPC
hide:
Expand Down
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
---
author: Nick Frichette
author_name: Nick Frichette
title: AWS Organizations Defaults
description: AWS Organizations is a common service to run into in AWS environments. It's default behavior can make it a target for attackers.
---
Expand Down
2 changes: 1 addition & 1 deletion content/aws/general-knowledge/connection-tracking.md
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
---
author: Nick Frichette
author_name: Nick Frichette
title: Connection Tracking
description: Abuse security group connection tracking to maintain persistence even when security group rules are changed.
hide:
Expand Down
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
---
author: Nick Frichette
author_name: Nick Frichette
title: Create a Console Session from IAM Credentials
description: "How to use IAM credentials to create an AWS Console session."
---
Expand Down
2 changes: 1 addition & 1 deletion content/aws/general-knowledge/iam-key-identifiers.md
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
---
author: Nick Frichette
author_name: Nick Frichette
title: IAM ID Identifiers
description: Chart of the IAM ID Prefixes.
hide:
Expand Down
2 changes: 1 addition & 1 deletion content/aws/general-knowledge/intro_metadata_service.md
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
---
author: Nick Frichette
author_name: Nick Frichette
title: Introduction to the Instance Metadata Service
description: An introduction to the Instance Metadata Service and how to access it.
---
Expand Down
2 changes: 1 addition & 1 deletion content/aws/general-knowledge/introduction_user_data.md
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
---
author: Nick Frichette
author_name: Nick Frichette
title: Introduction to User Data
description: An introduction to EC2 User Data and how to access it.
---
Expand Down
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
---
author: Nick Frichette
author_name: Nick Frichette
title: Using Stolen IAM Credentials
description: How to work with stolen IAM credentials and things to consider.
---
Expand Down
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
---
author: Nick Frichette
author_name: Nick Frichette
title: "Get IAM Credentials from a Console Session"
description: Convert access to the AWS Console into IAM credentials.
hide:
Expand Down
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
---
author: Nick Frichette
author_name: Nick Frichette
title: Intercept SSM Communications
description: With access to an EC2 instance you can intercept, modify, and spoof SSM communications.
---
Expand Down
2 changes: 1 addition & 1 deletion content/aws/post_exploitation/lambda_persistence.md
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
---
author: Nick Frichette
author_name: Nick Frichette
title: Lambda Persistence
description: How to establish persistence on a Lambda function after getting remote code execution.
---
Expand Down
2 changes: 1 addition & 1 deletion content/aws/post_exploitation/role-chain-juggling.md
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
---
author: Nick Frichette
author_name: Nick Frichette
title: Role Chain Juggling
description: Keep your access by chaining assume-role calls.
hide:
Expand Down
2 changes: 1 addition & 1 deletion content/aws/post_exploitation/run_shell_commands_on_ec2.md
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
---
author: Nick Frichette
author_name: Nick Frichette
title: "Run Shell Commands on EC2 with Send Command or Session Manager"
description: Leverage privileged access in an AWS account to run arbitrary commands on an EC2 instance.
---
Expand Down
2 changes: 1 addition & 1 deletion content/aws/post_exploitation/s3_acl_persistence.md
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
---
author: Wes Ladd
author_name: Wes Ladd
title: S3 File ACL Persistence
description: Maintain access to S3 resources by configuring Access Control Lists associated with S3 Buckets or Objects.
---
Expand Down
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
---
author: Nick Frichette
author_name: Nick Frichette
title: User Data Script Persistence
description: Maintain access to an EC2 instance and it's IAM role via user data scripts.
---
Expand Down
2 changes: 1 addition & 1 deletion content/azure/abusing-managed-identities.md
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
---
author: andrei8055
author_name: andrei8055
title: Abusing Managed Identities
description: Abusing Managed Identities
---
Expand Down
2 changes: 1 addition & 1 deletion content/azure/anonymous-blob-access.md
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
---
author: andrei8055
author_name: andrei8055
title: Anonymous Blob Access
description: Finding and accessing files stored in Azure Storage Accounts without authentication.
---
Expand Down
2 changes: 1 addition & 1 deletion content/azure/soft-deleted-blobs.md
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
---
author: andrei8055
author_name: andrei8055
title: Soft Deleted Blobs
description: Recovering and accessing files in private Storage Accounts that have been deleted.
---
Expand Down
2 changes: 1 addition & 1 deletion content/gcp/capture_the_flag/gcp-goat.md
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
---
author: Joshua Jebaraj
author_name: Joshua Jebaraj
title: GCP Goat
description: GCP Goat is the Vulnerable application for learning the GCP Security
hide:
Expand Down
2 changes: 1 addition & 1 deletion content/gcp/capture_the_flag/thunder_ctf.md
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
---
author: Aloïs THÉVENOT
author_name: Aloïs THÉVENOT
title: Thunder CTF
description: GCP themed CTF
---
Expand Down
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
---
author: Aloïs THÉVENOT
author_name: Aloïs THÉVENOT
title: Enumerate Service Account Permissions
description: Brute force the permissions of a service account to see what you have access to.
---
Expand Down
2 changes: 1 addition & 1 deletion content/gcp/exploitation/gcp-metadata-ssrf.md
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
---
author: Chris Moberly
author_name: Chris Moberly
title: Steal an OAuth Token via SSRF
description: Using SSRF to steal OAuth Tokens from a GCP hosted VM.
hide:
Expand Down
2 changes: 1 addition & 1 deletion content/gcp/exploitation/gcp-priv-esc.md
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
---
author: Chris Moberly
author_name: Chris Moberly
title: GCP Privilege Escalation
description: Common privilege escalation techniques in GCP.
---
Expand Down
2 changes: 1 addition & 1 deletion content/gcp/exploitation/gcp_iam_privilege_escalation.md
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
---
author: Aloïs THÉVENOT
author_name: Aloïs THÉVENOT
title: Privilege Escalation in Google Cloud Platform
description: Privilege escalation techniques for Google Cloud Platform (GCP)
hide:
Expand Down
2 changes: 1 addition & 1 deletion content/gcp/exploitation/local-priv-esc-metadata.md
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
---
author: Chris Moberly
author_name: Chris Moberly
title: "Local Privilege Escalation: Modifying the Metadata"
description: Escalating privileges on a VM via instance metadata.
---
Expand Down
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
---
author: Chris Moberly
author_name: Chris Moberly
title: Client Credential Search Order
description: The order by which GCP client libraries search for credentials.
---
Expand Down
2 changes: 1 addition & 1 deletion content/gcp/general-knowledge/default-account-names.md
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
---
author: Moses Frost (@mosesrenegade)
author_name: Moses Frost (@mosesrenegade)
title: Default Account Information
description: Default information on how accounts and service accounts exist in GCP
---
Expand Down
2 changes: 1 addition & 1 deletion content/gcp/general-knowledge/gcp-buckets.md
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
---
author: Moses Frost (@mosesrenegade)
author_name: Moses Frost (@mosesrenegade)
title: Hunting GCP Buckets
description: How to find valid and invalid GCP Buckets using tools
hide:
Expand Down
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
---
author: Jan Slezak
author_name: Jan Slezak
title: Metadata in Google Cloud Instances
description: Information about the data an attacker can access via GCP's API endpoints
hide:
Expand Down
2 changes: 1 addition & 1 deletion content/gcp/general-knowledge/security-and-constraints.md
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
---
author: Moses Frost (@mosesrenegade)
author_name: Moses Frost (@mosesrenegade)
title: Security and Constraints
description: Security considerations and constraints that are unique to GCP
---
Expand Down
2 changes: 1 addition & 1 deletion content/gcp/general-knowledge/security-concepts.md
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
---
author: Chris Moberly
author_name: Chris Moberly
title: Security Concepts
description: Common security concepts in GCP.
---
Expand Down
2 changes: 1 addition & 1 deletion content/gcp/post_exploitation/lateral-movement.md
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
---
author: Chris Moberly
author_name: Chris Moberly
title: Lateral Movement
description: Common lateral movement techniques in GCP.
---
Expand Down
Loading