From d48e2383e51cf5377763cde6bc461b71bee341e4 Mon Sep 17 00:00:00 2001 From: devubu Date: Tue, 29 Oct 2024 18:24:49 -0400 Subject: [PATCH] Fix typos --- pentesting-ci-cd/apache-airflow-security/README.md | 2 +- pentesting-ci-cd/cloudflare-security/README.md | 2 +- pentesting-ci-cd/cloudflare-security/cloudflare-domains.md | 2 +- pentesting-ci-cd/concourse-security/concourse-architecture.md | 2 +- pentesting-ci-cd/jenkins-security/basic-jenkins-information.md | 2 +- pentesting-ci-cd/okta-security/README.md | 2 +- .../aws-persistence/aws-lambda-persistence/README.md | 2 +- .../aws-codebuild-token-leakage.md | 2 +- .../aws-post-exploitation/aws-s3-post-exploitation.md | 2 +- .../aws-secrets-manager-post-exploitation.md | 2 +- .../aws-sso-and-identitystore-privesc.md | 2 +- .../aws-services/aws-directory-services-workdocs-enum.md | 2 +- .../aws-pentesting/aws-services/aws-elastic-beanstalk-enum.md | 2 +- .../aws-persistence/aws-lambda-persistence/README.md | 2 +- .../aws-codebuild-token-leakage.md | 2 +- .../aws-post-exploitation/aws-s3-post-exploitation.md | 2 +- .../aws-secrets-manager-post-exploitation.md | 2 +- .../aws-sso-and-identitystore-privesc.md | 2 +- .../aws-services/aws-directory-services-workdocs-enum.md | 2 +- .../aws-security/aws-services/aws-elastic-beanstalk-enum.md | 2 +- pentesting-cloud/aws-security/aws-services/aws-iam-enum.md | 2 +- .../az-processes-memory-access-token.md | 2 +- .../azure-ad-connect-hybrid-identity/phs-password-hash-sync.md | 2 +- 23 files changed, 23 insertions(+), 23 deletions(-) diff --git a/pentesting-ci-cd/apache-airflow-security/README.md b/pentesting-ci-cd/apache-airflow-security/README.md index c8211c469d..45f503c4b9 100644 --- a/pentesting-ci-cd/apache-airflow-security/README.md +++ b/pentesting-ci-cd/apache-airflow-security/README.md @@ -19,7 +19,7 @@ Learn & practice GCP Hacking: ..workers.dev`. The user can set it to a **subdomain** but you can always access it with that **original URL** if you know it. diff --git a/pentesting-ci-cd/cloudflare-security/cloudflare-domains.md b/pentesting-ci-cd/cloudflare-security/cloudflare-domains.md index eea351640b..6659d68784 100644 --- a/pentesting-ci-cd/cloudflare-security/cloudflare-domains.md +++ b/pentesting-ci-cd/cloudflare-security/cloudflare-domains.md @@ -78,7 +78,7 @@ TODO #### **CloudFlare DDoS Protection** -* If you can, enable **Bot Fight Mode** or **Super Bot Fight Mode**. If you protecting some API accessed programatically (from a JS front end page for example). You might not be able to enable this without breaking that access. +* If you can, enable **Bot Fight Mode** or **Super Bot Fight Mode**. If you protecting some API accessed programmatically (from a JS front end page for example). You might not be able to enable this without breaking that access. * In **WAF**: You can create **rate limits by URL path** or to **verified bots** (Rate limiting rules), or to **block access** based on IP, Cookie, referrer...). So you could block requests that doesn't come from a web page or has a cookie. * If the attack is from a **verified bot**, at least **add a rate limit** to bots. * If the attack is to a **specific path**, as prevention mechanism, add a **rate limit** in this path. diff --git a/pentesting-ci-cd/concourse-security/concourse-architecture.md b/pentesting-ci-cd/concourse-security/concourse-architecture.md index b4c29648b4..e8ef7977e8 100644 --- a/pentesting-ci-cd/concourse-security/concourse-architecture.md +++ b/pentesting-ci-cd/concourse-security/concourse-architecture.md @@ -27,7 +27,7 @@ Learn & practice GCP Hacking: ) -* **Project-based Matrix Authorization Strategy:** This mode is an **extension** to "**Matrix-based securit**y" that allows additional ACL matrix to be **defined for each project separately.** +* **Project-based Matrix Authorization Strategy:** This mode is an **extension** to "**Matrix-based security**" that allows additional ACL matrix to be **defined for each project separately.** * **Role-Based Strategy:** Enables defining authorizations using a **role-based strategy**. Manage the roles in `/role-strategy`. ## **Security Realm** diff --git a/pentesting-ci-cd/okta-security/README.md b/pentesting-ci-cd/okta-security/README.md index 88a8ad77af..11dc824a45 100644 --- a/pentesting-ci-cd/okta-security/README.md +++ b/pentesting-ci-cd/okta-security/README.md @@ -43,7 +43,7 @@ There are **users** (which can be **stored in Okta,** logged from configured **I These users can be inside **groups**.\ There are also **authenticators**: different options to authenticate like password, and several 2FA like WebAuthn, email, phone, okta verify (they could be enabled or disabled)... -Then, there are **applications** syncronized with Okta. Each applications will have some **mapping with Okta** to share information (such as email addresses, first names...). Moreover, each application must be inside an **Authentication Policy**, which indicates the **needed authenticators** for a user to **access** the application. +Then, there are **applications** synchronized with Okta. Each applications will have some **mapping with Okta** to share information (such as email addresses, first names...). Moreover, each application must be inside an **Authentication Policy**, which indicates the **needed authenticators** for a user to **access** the application. {% hint style="danger" %} The most powerful role is **Super Administrator**. diff --git a/pentesting-cloud/aws-pentesting/aws-persistence/aws-lambda-persistence/README.md b/pentesting-cloud/aws-pentesting/aws-persistence/aws-lambda-persistence/README.md index 6ea49c9f42..789a87f136 100644 --- a/pentesting-cloud/aws-pentesting/aws-persistence/aws-lambda-persistence/README.md +++ b/pentesting-cloud/aws-pentesting/aws-persistence/aws-lambda-persistence/README.md @@ -33,7 +33,7 @@ It's possible to **introduce/backdoor a layer to execute arbitrary code** when t ### Lambda Extension Persistence -Abusing Lambda Layers it's also possible to abuse extensions and persiste in the lambda but also steal and modify requests. +Abusing Lambda Layers it's also possible to abuse extensions and persist in the lambda but also steal and modify requests. {% content-ref url="aws-abusing-lambda-extensions.md" %} [aws-abusing-lambda-extensions.md](aws-abusing-lambda-extensions.md) diff --git a/pentesting-cloud/aws-pentesting/aws-post-exploitation/aws-codebuild-post-exploitation/aws-codebuild-token-leakage.md b/pentesting-cloud/aws-pentesting/aws-post-exploitation/aws-codebuild-post-exploitation/aws-codebuild-token-leakage.md index bf52049e21..c5528c21d8 100644 --- a/pentesting-cloud/aws-pentesting/aws-post-exploitation/aws-codebuild-post-exploitation/aws-codebuild-token-leakage.md +++ b/pentesting-cloud/aws-pentesting/aws-post-exploitation/aws-codebuild-post-exploitation/aws-codebuild-token-leakage.md @@ -17,7 +17,7 @@ Learn & practice GCP Hacking: --user-name privesc * Create a group and assign it permissions and set on it a controlled user * Give extra permissions to a controlled user or group -* By default, only users with permissions form the Management Account are going to be able to access and control de IAM Identity Center. +* By default, only users with permissions form the Management Account are going to be able to access and control the IAM Identity Center. However, it's possible via Delegate Administrator to allow users from a different account to manage it. They won't have exactly the same permission, but they will be able to perform [**management activities**](https://docs.aws.amazon.com/singlesignon/latest/userguide/delegated-admin.html). diff --git a/pentesting-cloud/azure-security/az-lateral-movement-cloud-on-prem/az-processes-memory-access-token.md b/pentesting-cloud/azure-security/az-lateral-movement-cloud-on-prem/az-processes-memory-access-token.md index 1884dd9746..47337c6e75 100644 --- a/pentesting-cloud/azure-security/az-lateral-movement-cloud-on-prem/az-processes-memory-access-token.md +++ b/pentesting-cloud/azure-security/az-lateral-movement-cloud-on-prem/az-processes-memory-access-token.md @@ -21,7 +21,7 @@ As explained in [**this video**](https://www.youtube.com/watch?v=OHKZkXC4Duw), s Steps: -1. Dump the excel processes syncronized with in EntraID user with your favourite tool. +1. Dump the excel processes synchronized with in EntraID user with your favourite tool. 2. Run: `string excel.dmp | grep 'eyJ0'` and find several tokens in the output 3. Find the tokens that interest you the most and run tools over them: diff --git a/pentesting-cloud/azure-security/az-lateral-movement-cloud-on-prem/azure-ad-connect-hybrid-identity/phs-password-hash-sync.md b/pentesting-cloud/azure-security/az-lateral-movement-cloud-on-prem/azure-ad-connect-hybrid-identity/phs-password-hash-sync.md index ae79f45525..0833386c0c 100644 --- a/pentesting-cloud/azure-security/az-lateral-movement-cloud-on-prem/azure-ad-connect-hybrid-identity/phs-password-hash-sync.md +++ b/pentesting-cloud/azure-security/az-lateral-movement-cloud-on-prem/azure-ad-connect-hybrid-identity/phs-password-hash-sync.md @@ -23,7 +23,7 @@ Learn & practice GCP Hacking: