Skip to content

Commit f7bbd56

Browse files
authored
Merge pull request #139 from JaimePolop/master
CosmosDB, Postgres and MySQL
2 parents 6234266 + d1a8335 commit f7bbd56

File tree

44 files changed

+1630
-52
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

44 files changed

+1630
-52
lines changed

src/SUMMARY.md

Lines changed: 14 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -3,8 +3,8 @@
33
# 👽 Welcome!
44

55
- [HackTricks Cloud](README.md)
6-
- [About the Author$$external:https://book.hacktricks.xyz/welcome/about-the-author$$]()
7-
- [HackTricks Values & faq$$external:https://book.hacktricks.xyz/welcome/hacktricks-values-and-faq$$]()
6+
- [About the Author$$external:https://book.hacktricks.wiki/en/welcome/about-the-author.html$$]()
7+
- [HackTricks Values & faq$$external:https://book.hacktricks.wiki/en/welcome/hacktricks-values-and-faq.html$$]()
88

99
# 🏭 Pentesting CI/CD
1010

@@ -408,12 +408,15 @@
408408
- [Az - ARM Templates / Deployments](pentesting-cloud/azure-security/az-services/az-arm-templates.md)
409409
- [Az - Automation Accounts](pentesting-cloud/azure-security/az-services/az-automation-accounts.md)
410410
- [Az - Azure App Services](pentesting-cloud/azure-security/az-services/az-app-services.md)
411+
- [Az - CosmosDB](pentesting-cloud/azure-security/az-services/az-cosmosDB.md)
411412
- [Az - Intune](pentesting-cloud/azure-security/az-services/intune.md)
412413
- [Az - File Shares](pentesting-cloud/azure-security/az-services/az-file-shares.md)
413414
- [Az - Function Apps](pentesting-cloud/azure-security/az-services/az-function-apps.md)
414415
- [Az - Key Vault](pentesting-cloud/azure-security/az-services/az-keyvault.md)
415416
- [Az - Logic Apps](pentesting-cloud/azure-security/az-services/az-logic-apps.md)
416417
- [Az - Management Groups, Subscriptions & Resource Groups](pentesting-cloud/azure-security/az-services/az-management-groups-subscriptions-and-resource-groups.md)
418+
- [Az - MySQL](pentesting-cloud/azure-security/az-services/az-mysql.md)
419+
- [Az - PostgreSQL](pentesting-cloud/azure-security/az-services/az-postgresql.md)
417420
- [Az - Queue Storage](pentesting-cloud/azure-security/az-services/az-queue-enum.md)
418421
- [Az - Service Bus](pentesting-cloud/azure-security/az-services/az-servicebus-enum.md)
419422
- [Az - SQL](pentesting-cloud/azure-security/az-services/az-sql.md)
@@ -442,9 +445,12 @@
442445
- [Az - Primary Refresh Token (PRT)](pentesting-cloud/azure-security/az-lateral-movement-cloud-on-prem/az-primary-refresh-token-prt.md)
443446
- [Az - Post Exploitation](pentesting-cloud/azure-security/az-post-exploitation/README.md)
444447
- [Az - Blob Storage Post Exploitation](pentesting-cloud/azure-security/az-post-exploitation/az-blob-storage-post-exploitation.md)
448+
- [Az - CosmosDB](pentesting-cloud/azure-security/az-services/az-cosmosDB-post-exploitation.md)
445449
- [Az - File Share Post Exploitation](pentesting-cloud/azure-security/az-post-exploitation/az-file-share-post-exploitation.md)
446450
- [Az - Function Apps Post Exploitation](pentesting-cloud/azure-security/az-post-exploitation/az-function-apps-post-exploitation.md)
447451
- [Az - Key Vault Post Exploitation](pentesting-cloud/azure-security/az-post-exploitation/az-key-vault-post-exploitation.md)
452+
- [Az - MySQL](pentesting-cloud/azure-security/az-services/az-mysql-post-exploitation.md)
453+
- [Az - PostgreSQL](pentesting-cloud/azure-security/az-services/az-postgresql-post-exploitation.md)
448454
- [Az - Queue Storage Post Exploitation](pentesting-cloud/azure-security/az-post-exploitation/az-queue-post-exploitation.md)
449455
- [Az - Service Bus Post Exploitation](pentesting-cloud/azure-security/az-post-exploitation/az-servicebus-post-exploitation.md)
450456
- [Az - Table Storage Post Exploitation](pentesting-cloud/azure-security/az-post-exploitation/az-table-storage-post-exploitation.md)
@@ -454,17 +460,20 @@
454460
- [Az - Azure IAM Privesc (Authorization)](pentesting-cloud/azure-security/az-privilege-escalation/az-authorization-privesc.md)
455461
- [Az - App Services Privesc](pentesting-cloud/azure-security/az-privilege-escalation/az-app-services-privesc.md)
456462
- [Az - Automation Accounts Privesc](pentesting-cloud/azure-security/az-privilege-escalation/az-automation-accounts-privesc.md)
463+
- [Az - CosmosDB](pentesting-cloud/azure-security/az-services/az-cosmosDB-privesc.md)
457464
- [Az - EntraID Privesc](pentesting-cloud/azure-security/az-privilege-escalation/az-entraid-privesc/README.md)
458465
- [Az - Conditional Access Policies & MFA Bypass](pentesting-cloud/azure-security/az-privilege-escalation/az-entraid-privesc/az-conditional-access-policies-mfa-bypass.md)
459466
- [Az - Dynamic Groups Privesc](pentesting-cloud/azure-security/az-privilege-escalation/az-entraid-privesc/dynamic-groups.md)
460467
- [Az - Functions App Privesc](pentesting-cloud/azure-security/az-privilege-escalation/az-functions-app-privesc.md)
461468
- [Az - Key Vault Privesc](pentesting-cloud/azure-security/az-privilege-escalation/az-key-vault-privesc.md)
469+
- [Az - MySQL](pentesting-cloud/azure-security/az-services/az-mysql-privesc.md)
470+
- [Az - PostgreSQL](pentesting-cloud/azure-security/az-services/az-postgresql-privesc.md)
462471
- [Az - Queue Storage Privesc](pentesting-cloud/azure-security/az-privilege-escalation/az-queue-privesc.md)
463472
- [Az - Service Bus Privesc](pentesting-cloud/azure-security/az-privilege-escalation/az-servicebus-privesc.md)
464-
- [Az - Virtual Machines & Network Privesc](pentesting-cloud/azure-security/az-privilege-escalation/az-virtual-machines-and-network-privesc.md)
465473
- [Az - Static Web App Privesc](pentesting-cloud/azure-security/az-privilege-escalation/az-static-web-apps-privesc.md)
466474
- [Az - Storage Privesc](pentesting-cloud/azure-security/az-privilege-escalation/az-storage-privesc.md)
467475
- [Az - SQL Privesc](pentesting-cloud/azure-security/az-privilege-escalation/az-sql-privesc.md)
476+
- [Az - Virtual Machines & Network Privesc](pentesting-cloud/azure-security/az-privilege-escalation/az-virtual-machines-and-network-privesc.md)
468477
- [Az - Persistence](pentesting-cloud/azure-security/az-persistence/README.md)
469478
- [Az - Queue Storage Persistence](pentesting-cloud/azure-security/az-persistence/az-queue-persistance.md)
470479
- [Az - VMs Persistence](pentesting-cloud/azure-security/az-persistence/az-vms-persistence.md)
@@ -501,8 +510,8 @@
501510

502511
# 🛫 Pentesting Network Services
503512

504-
- [HackTricks Pentesting Network$$external:https://book.hacktricks.xyz/generic-methodologies-and-resources/pentesting-network$$]()
505-
- [HackTricks Pentesting Services$$external:https://book.hacktricks.xyz/network-services-pentesting/pentesting-ssh$$]()
513+
- [HackTricks Pentesting Network$$external:https://book.hacktricks.wiki/en/generic-methodologies-and-resources/pentesting-network/index.html$$]()
514+
- [HackTricks Pentesting Services$$external:https://book.hacktricks.wiki/en/network-services-pentesting/pentesting-ssh.html$$]()
506515

507516

508517

src/pentesting-ci-cd/cloudflare-security/cloudflare-domains.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,7 @@ In each TLD configured in Cloudflare there are some **general settings and servi
2424
- [ ] Check that **DNSSEC** is **enabled**
2525
- [ ] Check that **CNAME Flattening** is **used** in **all CNAMEs**
2626
- This is could be useful to **hide subdomain takeover vulnerabilities** and improve load timings
27-
- [ ] Check that the domains [**aren't vulnerable to spoofing**](https://book.hacktricks.xyz/network-services-pentesting/pentesting-smtp#mail-spoofing)
27+
- [ ] Check that the domains [**aren't vulnerable to spoofing**](https://book.hacktricks.wiki/en/network-services-pentesting/pentesting-smtp/index.html#mail-spoofing)
2828

2929
### **Email**
3030

src/pentesting-ci-cd/github-security/abusing-github-actions/README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -553,7 +553,7 @@ docker pull ghcr.io/<org-name>/<repo_name>:<tag>
553553
Then, the user could search for **leaked secrets in the Docker image layers:**
554554

555555
{{#ref}}
556-
https://book.hacktricks.xyz/generic-methodologies-and-resources/basic-forensic-methodology/docker-forensics
556+
https://book.hacktricks.wiki/en/generic-methodologies-and-resources/basic-forensic-methodology/docker-forensics.html
557557
{{#endref}}
558558

559559
### Sensitive info in Github Actions logs

src/pentesting-cloud/aws-security/README.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -37,7 +37,7 @@ From a Red Team point of view, the **first step to compromise an AWS environment
3737
- **Social** Engineering
3838
- **Password** reuse (password leaks)
3939
- Vulnerabilities in AWS-Hosted Applications
40-
- [**Server Side Request Forgery**](https://book.hacktricks.xyz/pentesting-web/ssrf-server-side-request-forgery/cloud-ssrf) with access to metadata endpoint
40+
- [**Server Side Request Forgery**](https://book.hacktricks.wiki/en/pentesting-web/ssrf-server-side-request-forgery/cloud-ssrf.html) with access to metadata endpoint
4141
- **Local File Read**
4242
- `/home/USERNAME/.aws/credentials`
4343
- `C:\Users\USERNAME\.aws\credentials`
@@ -67,7 +67,7 @@ aws-permissions-for-a-pentest.md
6767
If you found a SSRF in a machine inside AWS check this page for tricks:
6868

6969
{{#ref}}
70-
https://book.hacktricks.xyz/pentesting-web/ssrf-server-side-request-forgery/cloud-ssrf
70+
https://book.hacktricks.wiki/en/pentesting-web/ssrf-server-side-request-forgery/cloud-ssrf.html
7171
{{#endref}}
7272

7373
### Whoami
@@ -147,7 +147,7 @@ As pentester/red teamer you should always check if you can find **sensitive info
147147
In this book you should find **information** about how to find **exposed AWS services and how to check them**. About how to find **vulnerabilities in exposed network services** I would recommend you to **search** for the specific **service** in:
148148

149149
{{#ref}}
150-
https://book.hacktricks.xyz/
150+
https://book.hacktricks.wiki/
151151
{{#endref}}
152152

153153
## Compromising the Organization

src/pentesting-cloud/aws-security/aws-basic-information/aws-federation-abuse.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@
77
For info about SAML please check:
88

99
{{#ref}}
10-
https://book.hacktricks.xyz/pentesting-web/saml-attacks
10+
https://book.hacktricks.wiki/en/pentesting-web/saml-attacks/index.html
1111
{{#endref}}
1212

1313
In order to configure an **Identity Federation through SAML** you just need to provide a **name** and the **metadata XML** containing all the SAML configuration (**endpoints**, **certificate** with public key)

src/pentesting-cloud/aws-security/aws-post-exploitation/aws-ec2-ebs-ssm-and-vpc-post-exploitation/README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -113,7 +113,7 @@ One of the scenarios where this is useful is pivoting from a [Bastion Host](http
113113
aws ssm start-session --target "$INSTANCE_ID"
114114
```
115115

116-
3. Get the Bastion EC2 AWS temporary credentials with the [Abusing SSRF in AWS EC2 environment](https://book.hacktricks.xyz/pentesting-web/ssrf-server-side-request-forgery/cloud-ssrf#abusing-ssrf-in-aws-ec2-environment) script
116+
3. Get the Bastion EC2 AWS temporary credentials with the [Abusing SSRF in AWS EC2 environment](https://book.hacktricks.wiki/en/pentesting-web/ssrf-server-side-request-forgery/cloud-ssrf.html#abusing-ssrf-in-aws-ec2-environment) script
117117
4. Transfer the credentials to your own machine in the `$HOME/.aws/credentials` file as `[bastion-ec2]` profile
118118
5. Log in to EKS as the Bastion EC2:
119119

src/pentesting-cloud/aws-security/aws-post-exploitation/aws-ecr-post-exploitation.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -51,7 +51,7 @@ aws ecr get-download-url-for-layer \
5151
After downloading the images you should **check them for sensitive info**:
5252

5353
{{#ref}}
54-
https://book.hacktricks.xyz/generic-methodologies-and-resources/basic-forensic-methodology/docker-forensics
54+
https://book.hacktricks.wiki/en/generic-methodologies-and-resources/basic-forensic-methodology/docker-forensics.html
5555
{{#endref}}
5656

5757
### `ecr:PutLifecyclePolicy` | `ecr:DeleteRepository` | `ecr-public:DeleteRepository` | `ecr:BatchDeleteImage` | `ecr-public:BatchDeleteImage`

src/pentesting-cloud/aws-security/aws-post-exploitation/aws-ecs-post-exploitation.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ In ECS an **IAM role can be assigned to the task** running inside the container.
1616
Which means that if you manage to **compromise** an ECS instance you can potentially **obtain the IAM role associated to the ECR and to the EC2 instance**. For more info about how to get those credentials check:
1717

1818
{{#ref}}
19-
https://book.hacktricks.xyz/pentesting-web/ssrf-server-side-request-forgery/cloud-ssrf
19+
https://book.hacktricks.wiki/en/pentesting-web/ssrf-server-side-request-forgery/cloud-ssrf.html
2020
{{#endref}}
2121

2222
> [!CAUTION]

src/pentesting-cloud/aws-security/aws-privilege-escalation/aws-lambda-privesc.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -194,7 +194,7 @@ aws --profile none-priv lambda update-function-configuration --function-name <fu
194194
For other scripting languages there are other env variables you can use. For more info check the subsections of scripting languages in:
195195

196196
{{#ref}}
197-
https://book.hacktricks.xyz/macos-hardening/macos-security-and-privilege-escalation/macos-proces-abuse
197+
https://book.hacktricks.wiki/en/macos-hardening/macos-security-and-privilege-escalation/macos-proces-abuse/index.html
198198
{{#endref}}
199199

200200
#### RCE via Lambda Layers

src/pentesting-cloud/aws-security/aws-services/aws-documentdb-enum.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,7 @@ aws --region us-east-1 --profile ad docdb describe-db-cluster-snapshot-attribute
2626
As DocumentDB is a MongoDB compatible database, you can imagine it's also vulnerable to common NoSQL injection attacks:
2727

2828
{{#ref}}
29-
https://book.hacktricks.xyz/pentesting-web/nosql-injection
29+
https://book.hacktricks.wiki/en/pentesting-web/nosql-injection.html
3030
{{#endref}}
3131

3232
### DocumentDB

0 commit comments

Comments
 (0)