From 75809e7394ea52fc8cf2096721f21af04da2aa5f Mon Sep 17 00:00:00 2001 From: Nick Frichette <10386884+Frichetten@users.noreply.github.com> Date: Thu, 5 Dec 2024 13:54:43 -0600 Subject: [PATCH] Update exploting_public_resources_attack_playbook.md Moved the title to be above the cards. --- .../exploting_public_resources_attack_playbook.md | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/content/aws/exploitation/Misconfigured_Resource-Based_Policies/exploting_public_resources_attack_playbook.md b/content/aws/exploitation/Misconfigured_Resource-Based_Policies/exploting_public_resources_attack_playbook.md index bdbcea3bf..31bc7ddea 100644 --- a/content/aws/exploitation/Misconfigured_Resource-Based_Policies/exploting_public_resources_attack_playbook.md +++ b/content/aws/exploitation/Misconfigured_Resource-Based_Policies/exploting_public_resources_attack_playbook.md @@ -4,6 +4,8 @@ title: Exploiting Public AWS Resources Programmatically - The Playbook description: A playbook on how to exploit AWS resources that can be misconfigured via resource-based policies. --- +# Exploiting Public AWS Resources - CLI Attack Playbook +
- :material-tools:{ .lg .middle } __Tools mentioned in this article__ @@ -15,9 +17,7 @@ description: A playbook on how to exploit AWS resources that can be misconfigure [coldsnap](https://github.com/awslabs/coldsnap): A command line interface for Amazon EBS snapshots
-# Exploiting Public AWS Resources - CLI Attack Playbook - -The playbook shows how to exploit AWS resources that can be misconfigured to be publicly accessible. Think of it as a glossary of quick exploitation techniques that can be performed programmatically. +This playbook shows how to exploit AWS resources that can be misconfigured to be publicly accessible. Think of it as a glossary of quick exploitation techniques that can be performed programmatically. All attacks are meant to be executed from an external environment where the attacker is ideally an administrator.