Skip to content

Commit 5e4f274

Browse files
authored
Update aws-ecr-enum.md
1 parent 6b5940a commit 5e4f274

File tree

1 file changed

+7
-11
lines changed

1 file changed

+7
-11
lines changed

src/pentesting-cloud/aws-security/aws-services/aws-ecr-enum.md

Lines changed: 7 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -2,13 +2,9 @@
22

33
{{#include ../../../banners/hacktricks-training.md}}
44

5-
## AWS - ECR Enum
5+
## ECR
66

7-
8-
9-
### ECR
10-
11-
#### Basic Information
7+
### Basic Information
128

139
Amazon **Elastic Container Registry** (Amazon ECR) is a **managed container image registry service**. It is designed to provide an environment where customers can interact with their container images using well-known interfaces. Specifically, the use of the Docker CLI or any preferred client is supported, enabling activities such as pushing, pulling, and managing container images.
1410

@@ -49,7 +45,7 @@ These are the **images** that in the **private registry** or to the **public** o
4945

5046
<figure><img src="../../../images/image (280).png" alt=""><figcaption></figcaption></figure>
5147

52-
#### Enumeration
48+
### Enumeration
5349

5450
```bash
5551
# Get repos
@@ -71,27 +67,27 @@ aws ecr get-registry-policy
7167
aws ecr get-repository-policy --repository-name <repo_name>
7268
```
7369

74-
#### Unauthenticated Enum
70+
### Unauthenticated Enum
7571

7672
{{#ref}}
7773
../aws-unauthenticated-enum-access/aws-ecr-unauthenticated-enum.md
7874
{{#endref}}
7975

80-
#### Privesc
76+
### Privesc
8177

8278
In the following page you can check how to **abuse ECR permissions to escalate privileges**:
8379

8480
{{#ref}}
8581
../aws-privilege-escalation/aws-ecr-privesc.md
8682
{{#endref}}
8783

88-
#### Post Exploitation
84+
### Post Exploitation
8985

9086
{{#ref}}
9187
../aws-post-exploitation/aws-ecr-post-exploitation.md
9288
{{#endref}}
9389

94-
#### Persistence
90+
### Persistence
9591

9692
{{#ref}}
9793
../aws-persistence/aws-ecr-persistence.md

0 commit comments

Comments
 (0)