Update aws-ecr-enum.md

This commit is contained in:
SirBroccoli
2025-08-01 11:50:28 +02:00
committed by GitHub
parent e1bc13c19c
commit 0a1f3dea22

View File

@@ -2,13 +2,9 @@
{{#include ../../../banners/hacktricks-training.md}}
## AWS - ECR Enum
## ECR
### ECR
#### Basic Information
### Basic Information
Amazon **Elastic Container Registry** (Amazon ECR) is a **managed container image registry service**. It is designed to provide an environment where customers can interact with their container images using well-known interfaces. Specifically, the use of the Docker CLI or any preferred client is supported, enabling activities such as pushing, pulling, and managing container images.
@@ -49,7 +45,7 @@ These are the **images** that in the **private registry** or to the **public** o
<figure><img src="../../../images/image (280).png" alt=""><figcaption></figcaption></figure>
#### Enumeration
### Enumeration
```bash
# Get repos
@@ -71,13 +67,13 @@ aws ecr get-registry-policy
aws ecr get-repository-policy --repository-name <repo_name>
```
#### Unauthenticated Enum
### Unauthenticated Enum
{{#ref}}
../aws-unauthenticated-enum-access/aws-ecr-unauthenticated-enum.md
{{#endref}}
#### Privesc
### Privesc
In the following page you can check how to **abuse ECR permissions to escalate privileges**:
@@ -85,13 +81,13 @@ In the following page you can check how to **abuse ECR permissions to escalate p
../aws-privilege-escalation/aws-ecr-privesc.md
{{#endref}}
#### Post Exploitation
### Post Exploitation
{{#ref}}
../aws-post-exploitation/aws-ecr-post-exploitation.md
{{#endref}}
#### Persistence
### Persistence
{{#ref}}
../aws-persistence/aws-ecr-persistence.md