GitBook: [#3656] No subject

This commit is contained in:
CPol 2022-11-07 23:12:56 +00:00 committed by gitbook-bot
parent 634c9868ae
commit ca7896b99a
No known key found for this signature in database
GPG key ID: 07D2180C7B12D0FF
2 changed files with 34 additions and 0 deletions

View file

@ -419,6 +419,7 @@
* [5000 - Pentesting Docker Registry](network-services-pentesting/5000-pentesting-docker-registry.md) * [5000 - Pentesting Docker Registry](network-services-pentesting/5000-pentesting-docker-registry.md)
* [5353/UDP Multicast DNS (mDNS) and DNS-SD](network-services-pentesting/5353-udp-multicast-dns-mdns.md) * [5353/UDP Multicast DNS (mDNS) and DNS-SD](network-services-pentesting/5353-udp-multicast-dns-mdns.md)
* [5432,5433 - Pentesting Postgresql](network-services-pentesting/pentesting-postgresql.md) * [5432,5433 - Pentesting Postgresql](network-services-pentesting/pentesting-postgresql.md)
* [5439 - Pentesting Redshift](network-services-pentesting/5439-pentesting-redshift.md)
* [5555 - Android Debug Bridge](network-services-pentesting/5555-android-debug-bridge.md) * [5555 - Android Debug Bridge](network-services-pentesting/5555-android-debug-bridge.md)
* [5601 - Pentesting Kibana](network-services-pentesting/5601-pentesting-kibana.md) * [5601 - Pentesting Kibana](network-services-pentesting/5601-pentesting-kibana.md)
* [5671,5672 - Pentesting AMQP](network-services-pentesting/5671-5672-pentesting-amqp.md) * [5671,5672 - Pentesting AMQP](network-services-pentesting/5671-5672-pentesting-amqp.md)

View file

@ -0,0 +1,33 @@
# 5439 - Pentesting Redshift
<details>
<summary><strong>Support HackTricks and get benefits!</strong></summary>
* Do you work in a **cybersecurity company**? Do you want to see your **company advertised in HackTricks**? or do you want to have access to the **latest version of the PEASS or download HackTricks in PDF**? Check the [**SUBSCRIPTION PLANS**](https://github.com/sponsors/carlospolop)!
* Discover [**The PEASS Family**](https://opensea.io/collection/the-peass-family), our collection of exclusive [**NFTs**](https://opensea.io/collection/the-peass-family)
* Get the [**official PEASS & HackTricks swag**](https://peass.creator-spring.com)
* **Join the** [**💬**](https://emojipedia.org/speech-balloon/) [**Discord group**](https://discord.gg/hRep4RUj7f) or the [**telegram group**](https://t.me/peass) or **follow** me on **Twitter** [**🐦**](https://github.com/carlospolop/hacktricks/tree/7af18b62b3bdc423e11444677a6a73d4043511e9/\[https:/emojipedia.org/bird/README.md)[**@carlospolopm**](https://twitter.com/carlospolopm)**.**
* **Share your hacking tricks by submitting PRs to the** [**hacktricks github repo**](https://github.com/carlospolop/hacktricks)**.**
</details>
## Basic Information
This port is used by **Redshift** to run. It's basically an AWS variation of **PostgreSQL**.
For more information check:
{% embed url="https://cloud.hacktricks.xyz/pentesting-cloud/aws-security/aws-services/aws-databases/aws-redshift-enum" %}
<details>
<summary><strong>Support HackTricks and get benefits!</strong></summary>
* Do you work in a **cybersecurity company**? Do you want to see your **company advertised in HackTricks**? or do you want to have access to the **latest version of the PEASS or download HackTricks in PDF**? Check the [**SUBSCRIPTION PLANS**](https://github.com/sponsors/carlospolop)!
* Discover [**The PEASS Family**](https://opensea.io/collection/the-peass-family), our collection of exclusive [**NFTs**](https://opensea.io/collection/the-peass-family)
* Get the [**official PEASS & HackTricks swag**](https://peass.creator-spring.com)
* **Join the** [**💬**](https://emojipedia.org/speech-balloon/) [**Discord group**](https://discord.gg/hRep4RUj7f) or the [**telegram group**](https://t.me/peass) or **follow** me on **Twitter** [**🐦**](https://github.com/carlospolop/hacktricks/tree/7af18b62b3bdc423e11444677a6a73d4043511e9/\[https:/emojipedia.org/bird/README.md)[**@carlospolopm**](https://twitter.com/carlospolopm)**.**
* **Share your hacking tricks by submitting PRs to the** [**hacktricks github repo**](https://github.com/carlospolop/hacktricks)**.**
</details>