diff --git a/cloud/aws/secretsmanager/steal-secretsmanager-secret/README.md b/cloud/aws/secretsmanager/steal-secretsmanager-secret/README.md index 36b7732..5ffa638 100644 --- a/cloud/aws/secretsmanager/steal-secretsmanager-secret/README.md +++ b/cloud/aws/secretsmanager/steal-secretsmanager-secret/README.md @@ -4,9 +4,14 @@ This script uses AWS CLI commands to exfiltrate secrets from AWS Secrets Manager ## Arguments -- **detect**: If set to true, the script will query CloudTrail to determine if the secret retrieval was logged. -- **target_secret_id**: The ID of the secret that you want to steal. If this is set to "all", the script will attempt to steal all secrets. -- **cleanup**: When set to true, the script will delete the pillaged secrets after execution. +- **detect**: If set to true, the script will + query CloudTrail to determine if the secret + retrieval was logged. +- **target_secret_id**: The ID of the secret that + you want to steal. If this is set to "all", the + script will attempt to steal all secrets. +- **cleanup**: When set to true, the script will + delete the pillaged secrets after execution. ## Pre-requisites diff --git a/privilege-escalation/credential-theft/enumerate-creds-lazagne/README.md b/privilege-escalation/credential-theft/enumerate-creds-lazagne/README.md index a23ba9c..1c83be2 100644 --- a/privilege-escalation/credential-theft/enumerate-creds-lazagne/README.md +++ b/privilege-escalation/credential-theft/enumerate-creds-lazagne/README.md @@ -17,8 +17,8 @@ extracting credentials stored on disk and in memory of a target system. ## Examples -Execute the `LaZagne` tool at a specified path. Post execution, -it cleans up the artifacts: +Execute the `LaZagne` tool at a specified path. +Post execution, it cleans up associated artifacts: ```bash ttpforge -c config.yaml \ @@ -29,13 +29,18 @@ ttpforge -c config.yaml \ ## Steps -1. **Setup**: Checks for the presence of Python3, pip3, and git. - If absent, an error message is displayed and the - script exits. If present, it checks for LaZagne tool at the - specified path. If absent, it clones the tool from its GitHub repository. - -1. **Run LaZagne**: Identifies the operating system of the system and - runs the LaZagne tool accordingly. - -1. **Cleanup**: If the `cleanup` argument is set to `true`, a cleanup - script is executed to remove artifacts created during script's execution. +1. **Setup**: Checks for the presence of Python3 + pip3, and git. + If absent, an error message is displayed and the + script exits. If present, it checks for LaZagne + tool at the specified path. If absent, it + clones the tool from its GitHub repository. + +1. **Run LaZagne**: Identifies the operating system + of the target and runs the LaZagne tool + accordingly. + +1. **Cleanup**: If the `cleanup` argument is set + to `true`, a cleanup + script is executed to remove artifacts created + during script's execution.