diff --git a/src/pentesting-cloud/aws-security/aws-unauthenticated-enum-access/README.md b/src/pentesting-cloud/aws-security/aws-unauthenticated-enum-access/README.md index 0250a6992..54f75cd63 100644 --- a/src/pentesting-cloud/aws-security/aws-unauthenticated-enum-access/README.md +++ b/src/pentesting-cloud/aws-security/aws-unauthenticated-enum-access/README.md @@ -15,24 +15,24 @@ Some useful **tools**: There are several services in AWS that could be configured giving some kind of access to all Internet or to more people than expected. Check here how: -- [**Accounts Unauthenticated Enum**](aws-accounts-unauthenticated-enum/README.md) -- [**Cloud9 Unauthenticated Enum**](https://github.com/carlospolop/hacktricks-cloud/blob/master/pentesting-cloud/aws-security/aws-unauthenticated-enum-access/broken-reference/README.md) -- [**Cloudfront Unauthenticated Enum**](aws-cloudfront-unauthenticated-enum/README.md) -- [**Cloudsearch Unauthenticated Enum**](https://github.com/carlospolop/hacktricks-cloud/blob/master/pentesting-cloud/aws-security/aws-unauthenticated-enum-access/broken-reference/README.md) -- [**Cognito Unauthenticated Enum**](aws-cognito-unauthenticated-enum/README.md) -- [**DocumentDB Unauthenticated Enum**](aws-documentdb-enum/README.md) -- [**EC2 Unauthenticated Enum**](aws-ec2-unauthenticated-enum/README.md) -- [**Elasticsearch Unauthenticated Enum**](aws-elasticsearch-unauthenticated-enum/README.md) -- [**IAM Unauthenticated Enum**](aws-iam-and-sts-unauthenticated-enum/README.md) -- [**IoT Unauthenticated Access**](aws-iot-unauthenticated-enum/README.md) -- [**Kinesis Video Unauthenticated Access**](aws-kinesis-video-unauthenticated-enum/README.md) -- [**Media Unauthenticated Access**](aws-media-unauthenticated-enum/README.md) -- [**MQ Unauthenticated Access**](aws-mq-unauthenticated-enum/README.md) -- [**MSK Unauthenticated Access**](aws-msk-unauthenticated-enum/README.md) -- [**RDS Unauthenticated Access**](aws-rds-unauthenticated-enum/README.md) -- [**Redshift Unauthenticated Access**](aws-redshift-unauthenticated-enum/README.md) -- [**SQS Unauthenticated Access**](aws-sqs-unauthenticated-enum/README.md) -- [**S3 Unauthenticated Access**](aws-s3-unauthenticated-enum/README.md) +- [**Accounts Unauthenticated Enum**](aws-accounts-unauthenticated-enum/index.html) +- [**Cloud9 Unauthenticated Enum**](https://github.com/carlospolop/hacktricks-cloud/blob/master/pentesting-cloud/aws-security/aws-unauthenticated-enum-access/broken-reference/index.html) +- [**Cloudfront Unauthenticated Enum**](aws-cloudfront-unauthenticated-enum/index.html) +- [**Cloudsearch Unauthenticated Enum**](https://github.com/carlospolop/hacktricks-cloud/blob/master/pentesting-cloud/aws-security/aws-unauthenticated-enum-access/broken-reference/index.html) +- [**Cognito Unauthenticated Enum**](aws-cognito-unauthenticated-enum/index.html) +- [**DocumentDB Unauthenticated Enum**](aws-documentdb-enum/index.html) +- [**EC2 Unauthenticated Enum**](aws-ec2-unauthenticated-enum/index.html) +- [**Elasticsearch Unauthenticated Enum**](aws-elasticsearch-unauthenticated-enum/index.html) +- [**IAM Unauthenticated Enum**](aws-iam-and-sts-unauthenticated-enum/index.html) +- [**IoT Unauthenticated Access**](aws-iot-unauthenticated-enum/index.html) +- [**Kinesis Video Unauthenticated Access**](aws-kinesis-video-unauthenticated-enum/index.html) +- [**Media Unauthenticated Access**](aws-media-unauthenticated-enum/index.html) +- [**MQ Unauthenticated Access**](aws-mq-unauthenticated-enum/index.html) +- [**MSK Unauthenticated Access**](aws-msk-unauthenticated-enum/index.html) +- [**RDS Unauthenticated Access**](aws-rds-unauthenticated-enum/index.html) +- [**Redshift Unauthenticated Access**](aws-redshift-unauthenticated-enum/index.html) +- [**SQS Unauthenticated Access**](aws-sqs-unauthenticated-enum/index.html) +- [**S3 Unauthenticated Access**](aws-s3-unauthenticated-enum/index.html) ## Cross Account Attacks