diff --git a/content/aws/exploitation/Misconfigured_Resource-Based_Policies/exploting_public_resources_attack_playbook.md b/content/aws/exploitation/Misconfigured_Resource-Based_Policies/exploting_public_resources_attack_playbook.md
index bdbcea3bf..31bc7ddea 100644
--- a/content/aws/exploitation/Misconfigured_Resource-Based_Policies/exploting_public_resources_attack_playbook.md
+++ b/content/aws/exploitation/Misconfigured_Resource-Based_Policies/exploting_public_resources_attack_playbook.md
@@ -4,6 +4,8 @@ title: Exploiting Public AWS Resources Programmatically - The Playbook
description: A playbook on how to exploit AWS resources that can be misconfigured via resource-based policies.
---
+# Exploiting Public AWS Resources - CLI Attack Playbook
+
- :material-tools:{ .lg .middle } __Tools mentioned in this article__
@@ -15,9 +17,7 @@ description: A playbook on how to exploit AWS resources that can be misconfigure
[coldsnap](https://github.com/awslabs/coldsnap): A command line interface for Amazon EBS snapshots
-# Exploiting Public AWS Resources - CLI Attack Playbook
-
-The playbook shows how to exploit AWS resources that can be misconfigured to be publicly accessible. Think of it as a glossary of quick exploitation techniques that can be performed programmatically.
+This playbook shows how to exploit AWS resources that can be misconfigured to be publicly accessible. Think of it as a glossary of quick exploitation techniques that can be performed programmatically.
All attacks are meant to be executed from an external environment where the attacker is ideally an administrator.