trasnlate other half

This commit is contained in:
Carlos Polop
2024-12-31 18:48:54 +01:00
parent 4d622f5500
commit d96df379fd
245 changed files with 406 additions and 0 deletions

View File

@@ -141,3 +141,4 @@ From a **white box security** review, you would need the **System Auditor role**

View File

@@ -177,3 +177,4 @@ If they are used for example inside a a bash command, you could perform a comman

View File

@@ -113,3 +113,4 @@ AUTH_ROLE_PUBLIC = 'Admin'

View File

@@ -45,3 +45,4 @@ These are the default permissions per default role:

View File

@@ -390,3 +390,4 @@ You can also pass these as environment variables `ATLANTIS_WEB_BASIC_AUTH=true`

View File

@@ -257,3 +257,4 @@ jobs:

View File

@@ -136,3 +136,4 @@ cloudflare-zero-trust-network.md

View File

@@ -35,3 +35,4 @@ concourse-enumeration-and-attacks.md

View File

@@ -40,3 +40,4 @@ In order to execute tasks concourse must have some workers. These workers **regi

View File

@@ -444,3 +444,4 @@ Accept-Encoding: gzip.

View File

@@ -153,3 +153,4 @@ Check a YAML pipeline example that triggers on new commits to master in [https:/

View File

@@ -140,3 +140,4 @@ If you are inside the server you can also **use the `gitea` binary** to access/m

View File

@@ -105,3 +105,4 @@ Different protections can be applied to a branch (like to master):

View File

@@ -246,3 +246,4 @@ For more info check [https://www.chainguard.dev/unchained/what-the-fork-imposter

View File

@@ -583,3 +583,4 @@ The following tools are useful to find Github Action workflows and even find vul

View File

@@ -58,3 +58,4 @@ And the latest one use a short sha-1 that is bruteforceable.

View File

@@ -257,3 +257,4 @@ Different protections can be applied to a branch (like to master):

View File

@@ -414,3 +414,4 @@ println(hudson.util.Secret.decrypt("{...}"))

View File

@@ -96,3 +96,4 @@ According to [**the docs**](https://www.jenkins.io/blog/2019/02/21/credentials-m

View File

@@ -107,3 +107,4 @@ The example curl command provided demonstrates how to make a request to Jenkins

View File

@@ -91,3 +91,4 @@ for (c in creds) {

View File

@@ -41,3 +41,4 @@ If you can access the configuration file of some pipeline configured you could j

View File

@@ -38,3 +38,4 @@ If you are not executing a reverse shell but a simple command you can **see the

View File

@@ -65,3 +65,4 @@ msf> use exploit/multi/http/jenkins_script_console

View File

@@ -116,3 +116,4 @@ okta-hardening.md

View File

@@ -201,3 +201,4 @@ Here you can download Okta agents to sync Okta with other technologies.

View File

@@ -106,3 +106,4 @@ Check this interesting article about the top 10 CI/CD risks according to Cider:

View File

@@ -860,3 +860,4 @@ Granting excessive permissions to team members and external collaborators can le

View File

@@ -165,3 +165,4 @@ It's possible to **store secrets** in supabase also which will be **accessible b

View File

@@ -314,3 +314,4 @@ brew install terrascan

View File

@@ -18,3 +18,4 @@ Github PRs are welcome explaining how to (ab)use those platforms from an attacke

View File

@@ -67,3 +67,4 @@ If an attacker ends in an environment which uses **TravisCI enterprise** (more i

View File

@@ -94,3 +94,4 @@ The amount of deployed TCI Worker and build environment OS images will determine

View File

@@ -439,3 +439,4 @@ An **Access Group** in Vercel is a collection of projects and team members with