Skip to content

Commit

Permalink
perf: optimize the description of the English readme (#11)
Browse files Browse the repository at this point in the history
  • Loading branch information
teamssix committed May 6, 2022
1 parent 60f1c03 commit 9205927
Show file tree
Hide file tree
Showing 15 changed files with 17 additions and 17 deletions.
2 changes: 1 addition & 1 deletion README.md
Original file line number Diff line number Diff line change
Expand Up @@ -68,4 +68,4 @@ docker rmi terraformgoat:v0.1
## Notice

1. The README of each vulnerable environment is executed within the terraformgoat container environment, so the terraformgoat container environment needs to be deployed first.
2. Due to the horizontal risk of intranet horizontal on the cloud in some ranges, it is strongly recommended that users use their own test accounts to configure the ranges, avoid using the cloud account of the production environment, and install Terraform Goat using Dockerfile to isolate the user's local cloud vendor token and the test account token.
2. Due to the horizontal risk of intranet horizontal on the cloud in some scenarios, it is strongly recommended that users use their own test accounts to configure the scenarios, avoid using the cloud account of the production environment, and install Terraform Goat using Dockerfile to isolate the user's local cloud vendor token and the test account token.
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@

English | [中文](./README_CN.md)

This is a script that helps you quickly build ACL read/write scenarios for storage bucket objects
This is a script that helps you quickly build ACL read/write scenario for storage bucket objects

Although you may not encounter it in a real situation, but have fun!

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@ English | [中文](./README_CN.md)

This is a script that will help you quickly start a storage bucket with a special policy configuration, Get Flag

Although in actual use will not encounter this kind of range, but enjoy playing
Although in actual use will not encounter this kind of scenario, but enjoy playing

## Deployment Environment

Expand Down
6 changes: 3 additions & 3 deletions aws/elastic_computing_service/ec2_ssrf/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@ English | [中文](./README_CN.md)

## Description

This is a shooting range used to build the AWS EC2 SSRF vulnerability environment.
This is a scenario used to build the AWS EC2 SSRF vulnerability environment.

After building the environment with Terraform, users can obtain metadata and user data and other information on EC2 through the SSRF vulnerabilities.

Expand Down Expand Up @@ -37,7 +37,7 @@ terraform apply
![img](../../../images/1650428695.png)

After the environment is set up, You can see the access address of the shooting range at Outputs, then access to the browser.
After the environment is set up, You can see the access address of the scenario at Outputs, then access to the browser.

![img](../../../images/1650429022.png)

Expand All @@ -63,7 +63,7 @@ http://169.254.169.254/latest/user-data

![img](../../../images/1650429432.png)

In the user data information, you can see that there is a flag file in the root directory of the shooting range, try to use SSRF to read this file.
In the user data information, you can see that there is a flag file in the root directory of the scenario, try to use SSRF to read this file.

```shell
file:///flag69152201.txt
Expand Down
2 changes: 1 addition & 1 deletion aws/object_storage_service/object_acl_writable/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@

English | [中文](./README_CN.md)

This is a script that can help you quickly build a bucket object ACL reading and writing scenarios
This is a script that can help you quickly build a bucket object ACL reading and writing scenario

Although you may not encounter it in a real environment, have fun playing

Expand Down
2 changes: 1 addition & 1 deletion azure/object_storage_service/blob_public_access/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@ English | [中文](./README_CN.md)

## Description

This is a vulnerability environment range for building public access to Microsoft cloud storage blobs.
This is a vulnerability environment scenario for building public access to Microsoft cloud storage blobs.

After you build an environment with Terraform, users can access blobs with public access directly.

Expand Down
2 changes: 1 addition & 1 deletion gcp/object_storage_service/bucket_acl_writable/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@ English | [中文](./README_CN.md)

## Description

This is a vulnerability environment range for building GCP cloud storage bucket ACLs that can be written.
This is a vulnerability environment scenario for building GCP cloud storage bucket ACLs that can be written.

After you build an environment using Terraform, you can modify the bucket's ACL policy to make data that could otherwise be read unreadable, resulting in an unavailable cloud storage service.

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@ English | [中文](./README_CN.md)

## Description

This is a vulnerability environment shooting range for building GCP cloud storage bucket object traversal.
This is a vulnerability environment scenario for building GCP cloud storage bucket object traversal.

After building the environment with Terraform, Users can traverse the objects in the vulnerable Bucket and access the objects by splicing the key values of the objects.

Expand Down
2 changes: 1 addition & 1 deletion gcp/object_storage_service/object_acl_writable/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@ English | [中文](./README_CN.md)

## Description

This is a vulnerability environment shooting range for building GCP cloud storage object ACL writable.
This is a vulnerability environment scenario for building GCP cloud storage object ACL writable.

After building the environment with Terraform, Users can read the data that could not be read by modifying the ACL policy of the object.

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@ English | [中文](./README_CN.md)

## Description

This is a vulnerability environment shooting range for building GCP cloud storage unrestricted file upload.
This is a vulnerability environment scenario for building GCP cloud storage unrestricted file upload.

After building the environment with Terraform, Users can upload any file to cloud storage through PUT method.

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@ English | [中文](./README_CN.md)

## Description

This is a vulnerability environment shooting range for building Huawei Cloud object storage bucket object traversal.
This is a vulnerability environment scenario for building Huawei Cloud object storage bucket object traversal.

When you build an environment using Terraform, users can traverse objects in a vulnerable bucket and access them by stitching them into key values.

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@ English | [中文](./README_CN.md)

## Description

This is a vulnerability environment range for building HUAWEI CLOUD Object ACL.
This is a vulnerability environment scenario for building HUAWEI CLOUD Object ACL.

After you build an environment with Terraform, users can read data that would otherwise not be read by modifying object's ACL policy.

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@ English | [中文](./README_CN.md)

## Description

This is a vulnerability environment range for building a special bucket policy for HUAWEI CLOUD object storage.
This is a vulnerability environment scenario for building a special bucket policy for HUAWEI CLOUD object storage.

After you build an environment using Terraform, you can configure specific bucket policies to read data that would otherwise not be readable.

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@ English | [中文](./README_CN.md)

## Description

This is a vulnerability environment shooting range for building Huawei Cloud object storage unrestricted file upload.
This is a vulnerability environment scenario for building Huawei Cloud object storage unrestricted file upload.

After building the environment with Terraform, Users can upload unrestricted file in the vulnerable bucket.

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@

English | [中文](./README_CN.md)

This is a script that can quickly help you build arbitrary file upload scenarios for storage buckets
This is a script that can quickly help you build arbitrary file upload scenario for storage buckets

## Deployment environment

Expand Down

0 comments on commit 9205927

Please sign in to comment.