Skip to content

Commit 586a381

Browse files
JimmyJimmy
authored andcommitted
Update URLs
1 parent 7f51360 commit 586a381

File tree

35 files changed

+51
-51
lines changed

35 files changed

+51
-51
lines changed

src/SUMMARY.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -3,8 +3,8 @@
33
# 👽 Welcome!
44

55
- [HackTricks Cloud](README.md)
6-
- [About the Author$$external:https://book.hacktricks.xyz/welcome/about-the-author$$]()
7-
- [HackTricks Values & faq$$external:https://book.hacktricks.xyz/welcome/hacktricks-values-and-faq$$]()
6+
- [About the Author$$external:https://book.hacktricks.wiki/en/welcome/about-the-author.html$$]()
7+
- [HackTricks Values & faq$$external:https://book.hacktricks.wiki/en/welcome/hacktricks-values-and-faq.html$$]()
88

99
# 🏭 Pentesting CI/CD
1010

@@ -510,8 +510,8 @@
510510

511511
# 🛫 Pentesting Network Services
512512

513-
- [HackTricks Pentesting Network$$external:https://book.hacktricks.xyz/generic-methodologies-and-resources/pentesting-network$$]()
514-
- [HackTricks Pentesting Services$$external:https://book.hacktricks.xyz/network-services-pentesting/pentesting-ssh$$]()
513+
- [HackTricks Pentesting Network$$external:https://book.hacktricks.wiki/en/generic-methodologies-and-resources/pentesting-network/index.html$$]()
514+
- [HackTricks Pentesting Services$$external:https://book.hacktricks.wiki/en/network-services-pentesting/pentesting-ssh.html$$]()
515515

516516

517517

src/pentesting-ci-cd/cloudflare-security/cloudflare-domains.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,7 @@ In each TLD configured in Cloudflare there are some **general settings and servi
2424
- [ ] Check that **DNSSEC** is **enabled**
2525
- [ ] Check that **CNAME Flattening** is **used** in **all CNAMEs**
2626
- This is could be useful to **hide subdomain takeover vulnerabilities** and improve load timings
27-
- [ ] Check that the domains [**aren't vulnerable to spoofing**](https://book.hacktricks.xyz/network-services-pentesting/pentesting-smtp#mail-spoofing)
27+
- [ ] Check that the domains [**aren't vulnerable to spoofing**](https://book.hacktricks.wiki/en/network-services-pentesting/pentesting-smtp/index.html#mail-spoofing)
2828

2929
### **Email**
3030

src/pentesting-ci-cd/github-security/abusing-github-actions/README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -553,7 +553,7 @@ docker pull ghcr.io/<org-name>/<repo_name>:<tag>
553553
Then, the user could search for **leaked secrets in the Docker image layers:**
554554

555555
{{#ref}}
556-
https://book.hacktricks.xyz/generic-methodologies-and-resources/basic-forensic-methodology/docker-forensics
556+
https://book.hacktricks.wiki/en/generic-methodologies-and-resources/basic-forensic-methodology/docker-forensics.html
557557
{{#endref}}
558558

559559
### Sensitive info in Github Actions logs

src/pentesting-cloud/aws-security/README.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -37,7 +37,7 @@ From a Red Team point of view, the **first step to compromise an AWS environment
3737
- **Social** Engineering
3838
- **Password** reuse (password leaks)
3939
- Vulnerabilities in AWS-Hosted Applications
40-
- [**Server Side Request Forgery**](https://book.hacktricks.xyz/pentesting-web/ssrf-server-side-request-forgery/cloud-ssrf) with access to metadata endpoint
40+
- [**Server Side Request Forgery**](https://book.hacktricks.wiki/en/pentesting-web/ssrf-server-side-request-forgery/cloud-ssrf.html) with access to metadata endpoint
4141
- **Local File Read**
4242
- `/home/USERNAME/.aws/credentials`
4343
- `C:\Users\USERNAME\.aws\credentials`
@@ -67,7 +67,7 @@ aws-permissions-for-a-pentest.md
6767
If you found a SSRF in a machine inside AWS check this page for tricks:
6868

6969
{{#ref}}
70-
https://book.hacktricks.xyz/pentesting-web/ssrf-server-side-request-forgery/cloud-ssrf
70+
https://book.hacktricks.wiki/en/pentesting-web/ssrf-server-side-request-forgery/cloud-ssrf.html
7171
{{#endref}}
7272

7373
### Whoami
@@ -147,7 +147,7 @@ As pentester/red teamer you should always check if you can find **sensitive info
147147
In this book you should find **information** about how to find **exposed AWS services and how to check them**. About how to find **vulnerabilities in exposed network services** I would recommend you to **search** for the specific **service** in:
148148

149149
{{#ref}}
150-
https://book.hacktricks.xyz/
150+
https://book.hacktricks.wiki/
151151
{{#endref}}
152152

153153
## Compromising the Organization

src/pentesting-cloud/aws-security/aws-basic-information/aws-federation-abuse.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@
77
For info about SAML please check:
88

99
{{#ref}}
10-
https://book.hacktricks.xyz/pentesting-web/saml-attacks
10+
https://book.hacktricks.wiki/en/pentesting-web/saml-attacks/index.html
1111
{{#endref}}
1212

1313
In order to configure an **Identity Federation through SAML** you just need to provide a **name** and the **metadata XML** containing all the SAML configuration (**endpoints**, **certificate** with public key)

src/pentesting-cloud/aws-security/aws-post-exploitation/aws-ec2-ebs-ssm-and-vpc-post-exploitation/README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -113,7 +113,7 @@ One of the scenarios where this is useful is pivoting from a [Bastion Host](http
113113
aws ssm start-session --target "$INSTANCE_ID"
114114
```
115115

116-
3. Get the Bastion EC2 AWS temporary credentials with the [Abusing SSRF in AWS EC2 environment](https://book.hacktricks.xyz/pentesting-web/ssrf-server-side-request-forgery/cloud-ssrf#abusing-ssrf-in-aws-ec2-environment) script
116+
3. Get the Bastion EC2 AWS temporary credentials with the [Abusing SSRF in AWS EC2 environment](https://book.hacktricks.wiki/en/pentesting-web/ssrf-server-side-request-forgery/cloud-ssrf.html#abusing-ssrf-in-aws-ec2-environment) script
117117
4. Transfer the credentials to your own machine in the `$HOME/.aws/credentials` file as `[bastion-ec2]` profile
118118
5. Log in to EKS as the Bastion EC2:
119119

src/pentesting-cloud/aws-security/aws-post-exploitation/aws-ecr-post-exploitation.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -51,7 +51,7 @@ aws ecr get-download-url-for-layer \
5151
After downloading the images you should **check them for sensitive info**:
5252

5353
{{#ref}}
54-
https://book.hacktricks.xyz/generic-methodologies-and-resources/basic-forensic-methodology/docker-forensics
54+
https://book.hacktricks.wiki/en/generic-methodologies-and-resources/basic-forensic-methodology/docker-forensics.html
5555
{{#endref}}
5656

5757
### `ecr:PutLifecyclePolicy` | `ecr:DeleteRepository` | `ecr-public:DeleteRepository` | `ecr:BatchDeleteImage` | `ecr-public:BatchDeleteImage`

src/pentesting-cloud/aws-security/aws-post-exploitation/aws-ecs-post-exploitation.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ In ECS an **IAM role can be assigned to the task** running inside the container.
1616
Which means that if you manage to **compromise** an ECS instance you can potentially **obtain the IAM role associated to the ECR and to the EC2 instance**. For more info about how to get those credentials check:
1717

1818
{{#ref}}
19-
https://book.hacktricks.xyz/pentesting-web/ssrf-server-side-request-forgery/cloud-ssrf
19+
https://book.hacktricks.wiki/en/pentesting-web/ssrf-server-side-request-forgery/cloud-ssrf.html
2020
{{#endref}}
2121

2222
> [!CAUTION]

src/pentesting-cloud/aws-security/aws-privilege-escalation/aws-lambda-privesc.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -194,7 +194,7 @@ aws --profile none-priv lambda update-function-configuration --function-name <fu
194194
For other scripting languages there are other env variables you can use. For more info check the subsections of scripting languages in:
195195

196196
{{#ref}}
197-
https://book.hacktricks.xyz/macos-hardening/macos-security-and-privilege-escalation/macos-proces-abuse
197+
https://book.hacktricks.wiki/en/macos-hardening/macos-security-and-privilege-escalation/macos-proces-abuse/index.html
198198
{{#endref}}
199199

200200
#### RCE via Lambda Layers

src/pentesting-cloud/aws-security/aws-services/aws-documentdb-enum.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,7 @@ aws --region us-east-1 --profile ad docdb describe-db-cluster-snapshot-attribute
2626
As DocumentDB is a MongoDB compatible database, you can imagine it's also vulnerable to common NoSQL injection attacks:
2727

2828
{{#ref}}
29-
https://book.hacktricks.xyz/pentesting-web/nosql-injection
29+
https://book.hacktricks.wiki/en/pentesting-web/nosql-injection.html
3030
{{#endref}}
3131

3232
### DocumentDB

0 commit comments

Comments
 (0)