diff --git a/AWS Amazon Bucket S3/README.md b/AWS Amazon Bucket S3/README.md index 6f14f72..1a73cf7 100644 --- a/AWS Amazon Bucket S3/README.md +++ b/AWS Amazon Bucket S3/README.md @@ -75,7 +75,7 @@ eg: http://redacted/avatar/123%C0 ```bash aws s3 ls s3://targetbucket --no-sign-request --region insert-region-here -aws s3 ls s3://flaws.cloud/ --no-sign-request --region us-west-2 +aws s3 ls s3://flaws.cloud/ --no-sign-request --region us-west-2 ``` You can get the region with a dig and nslookup @@ -127,7 +127,7 @@ $ aws --profile flaws sts get-caller-identity $ aws --profile profile_name ec2 describe-snapshots -$ aws --profile flaws ec2 describe-snapshots --owner-id XXXX26262029 --region us-west-2 +$ aws --profile flaws ec2 describe-snapshots --owner-id XXXX26262029 --region us-west-2 "SnapshotId": "snap-XXXX342abd1bdcb89", Create a volume using snapshot @@ -192,4 +192,4 @@ pip install -r requirements.txt * [Guardzilla video camera hardcoded AWS credential - 0dayallday.org](https://www.0dayallday.org/guardzilla-video-camera-hard-coded-aws-credentials/) * [AWS PENETRATION TESTING PART 1. S3 BUCKETS - VirtueSecurity](https://www.virtuesecurity.com/aws-penetration-testing-part-1-s3-buckets/) * [AWS PENETRATION TESTING PART 2. S3, IAM, EC2 - VirtueSecurity](https://www.virtuesecurity.com/aws-penetration-testing-part-2-s3-iam-ec2/) -* [A Technical Analysis of the Capital One Hack - CloudSploit - Aug 2 2019](https://blog.cloudsploit.com/a-technical-analysis-of-the-capital-one-hack-a9b43d7c8aea?gi=8bb65b77c2cf) \ No newline at end of file +* [A Technical Analysis of the Capital One Hack - CloudSploit - Aug 2 2019](https://blog.cloudsploit.com/a-technical-analysis-of-the-capital-one-hack-a9b43d7c8aea?gi=8bb65b77c2cf) diff --git a/CORS Misconfiguration/README.md b/CORS Misconfiguration/README.md index 32f00ad..12f8dad 100644 --- a/CORS Misconfiguration/README.md +++ b/CORS Misconfiguration/README.md @@ -113,7 +113,7 @@ origin in the request: ```html