Skip to content

Commit 7c44e75

Browse files
committed
Merge branch 'master' of github.com:HackTricks-wiki/hacktricks-cloud
2 parents 3547ed0 + 4592035 commit 7c44e75

File tree

3 files changed

+7
-20
lines changed

3 files changed

+7
-20
lines changed

searchindex.js

Lines changed: 1 addition & 1 deletion
Large diffs are not rendered by default.

src/pentesting-cloud/aws-security/aws-privilege-escalation/aws-s3-privesc.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -62,7 +62,7 @@ So, if you have the permissions listed over these files, there is an attack vect
6262
Follow the description in the *Abusing Terraform State Files* section of the *Terraform Security* page for directly usable exploit code:
6363

6464
{{#ref}}
65-
pentesting-ci-cd/terraform-security.md#abusing-terraform-state-files
65+
../../../pentesting-ci-cd/terraform-security.md#abusing-terraform-state-files
6666
{{#endref}}
6767

6868
### `s3:PutBucketPolicy`

src/pentesting-cloud/azure-security/az-privilege-escalation/az-automation-accounts-privesc.md

Lines changed: 5 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -156,26 +156,13 @@ az rest --method PUT \
156156

157157
With the permission **`Microsoft.Automation/automationAccounts/webhooks/write`** it's possible to create a new Webhook for a Runbook inside an Automation Account using the following command.
158158

159-
Note that you will need to **indicate webhook URI** with the token to use.
160-
161159
```bash
162-
az rest --method PUT \
163-
--url "https://management.azure.com/subscriptions/<subscription-id>/resourceGroups/<res-group>/providers/Microsoft.Automation/automationAccounts/<automantion-account-name>/webhooks/<webhook-name>?api-version=2018-06-30" \
164-
--body '{
165-
"name": "<webhook-name>",
166-
"properties": {
167-
"isEnabled": true,
168-
"expiryTime": "2026-01-09T20:03:30.291Z",
169-
"parameters": {},
170-
"runOn": null,
171-
"runbook": {
172-
"name": "<runbook-name>"
173-
},
174-
"uri": "https://f931b47b-18c8-45a2-9d6d-0211545d8c02.webhook.eus.azure-automation.net/webhooks?token=Ts5WmbKk0zcuA8PEUD4pr%2f6SM0NWydiCDqCqS1IdzIU%3d"
175-
}
176-
}'
160+
New-AzAutomationWebHook -Name <webhook-name> -ResourceGroupName <res-group> -AutomationAccountName <automation-account-name> -RunbookName <runbook-name> -IsEnabled $true
161+
```
162+
163+
This command should return a webhook URI which is only displayed on creation. Then, to call the runbook using the webhook URI
177164

178-
# Then, to call the runbook using the webhook
165+
```bash
179166
curl -X POST "https://f931b47b-18c8-45a2-9d6d-0211545d8c02.webhook.eus.azure-automation.net/webhooks?token=Ts5WmbKk0zcuA8PEUD4pr%2f6SM0NWydiCDqCqS1IdzIU%3d" \
180167
-H "Content-Length: 0"
181168
```

0 commit comments

Comments
 (0)