Skip to content

Commit fe00aa0

Browse files
arte-courtneybell-corrections
Minor fixes (fix to one command based on testing, 2 typo corrections)
1 parent 885a539 commit fe00aa0

3 files changed

Lines changed: 3 additions & 3 deletions

File tree

src/pentesting-cloud/aws-security/aws-privilege-escalation/aws-codebuild-privesc.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -225,7 +225,7 @@ JSON="{
225225

226226
printf "$JSON" > $REV_PATH
227227

228-
aws codebuild update-project --cli-input-json file://$REV_PATH
228+
aws codebuild update-project --name codebuild-demo-project --cli-input-json file://$REV_PATH
229229

230230
aws codebuild start-build --project-name codebuild-demo-project
231231
```

src/pentesting-cloud/aws-security/aws-privilege-escalation/aws-sns-privesc.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -28,7 +28,7 @@ An attacker could subscribe or to an SNS topic, potentially gaining unauthorized
2828
aws sns subscribe --topic-arn <value> --protocol <value> --endpoint <value>
2929
```
3030

31-
**Potential Impact**: Unauthorized access to messages (sensitve info), service disruption for applications relying on the affected topic.
31+
**Potential Impact**: Unauthorized access to messages (sensitive info), service disruption for applications relying on the affected topic.
3232

3333
### `sns:AddPermission`
3434

src/pentesting-cloud/aws-security/aws-privilege-escalation/aws-stepfunctions-privesc.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,7 @@ Or you could also go to the API AWS documentation and check each action docs:
2525

2626
### `states:TestState` & `iam:PassRole`
2727

28-
An attacker with the **`states:TestState`** & **`iam:PassRole`** permissions can test any state and pass any IAM role to it without creating or updating an existing state machine, enabling unauthorized access to other AWS services with the roles' permissions. potentially. Combined, these permissions can lead to extensive unauthorized actions, from manipulating workflows to alter data to data breaches, resource manipulation, and privilege escalation.
28+
An attacker with the **`states:TestState`** & **`iam:PassRole`** permissions can test any state and pass any IAM role to it without creating or updating an existing state machine, potentially enabling unauthorized access to other AWS services with the roles' permissions. Combined, these permissions can lead to extensive unauthorized actions, from manipulating workflows to alter data to data breaches, resource manipulation, and privilege escalation.
2929

3030
```bash
3131
aws states test-state --definition <value> --role-arn <value> [--input <value>] [--inspection-level <value>] [--reveal-secrets | --no-reveal-secrets]

0 commit comments

Comments
 (0)