GitBook: [#2792] asdasd
This commit is contained in:
parent
02f967777d
commit
55da5e0b9b
|
@ -502,6 +502,7 @@
|
|||
* [GCP - Looting](cloud-security/gcp-security/gcp-looting.md)
|
||||
* [GCP - Interesting Permissions](cloud-security/gcp-security/gcp-interesting-permissions.md)
|
||||
* [GCP - Buckets Brute-Force & Privilege Escalation](cloud-security/gcp-security/gcp-buckets-brute-force-and-privilege-escalation.md)
|
||||
* [Page 1](cloud-security/gcp-security/page-1.md)
|
||||
|
||||
## Physical attacks
|
||||
|
||||
|
|
|
@ -257,6 +257,10 @@ Remember that in all those **resources belonging to a project** you can use the
|
|||
|
||||
## Unauthenticated Attacks
|
||||
|
||||
{% content-ref url="gcp-buckets-brute-force-and-privilege-escalation.md" %}
|
||||
[gcp-buckets-brute-force-and-privilege-escalation.md](gcp-buckets-brute-force-and-privilege-escalation.md)
|
||||
{% endcontent-ref %}
|
||||
|
||||
## Local Privilege Escalation / SSH Pivoting
|
||||
|
||||
Supposing that you have compromised a VM in GCP, there are some **GCP privileges** that can allow you to **escalate privileges locally, into other machines and also pivot to other VMs**:
|
||||
|
|
|
@ -0,0 +1,2 @@
|
|||
# Page 1
|
||||
|
Loading…
Reference in New Issue