mirror of
https://github.com/HackTricks-wiki/hacktricks-cloud.git
synced 2026-01-18 15:45:54 -08:00
translate
This commit is contained in:
@@ -4,4 +4,3 @@
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
@@ -23,4 +23,3 @@ Check how to do this in:
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
@@ -23,4 +23,3 @@ If yoi could just modify the code of a running version or create a new one yo co
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
@@ -44,4 +44,3 @@ https://book.hacktricks.xyz/pentesting-web/dependency-confusion
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
@@ -23,4 +23,3 @@ Grant further access over datasets, tables, rows and columns to compromised user
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
@@ -21,4 +21,3 @@ For more info about Cloud Functions check:
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
@@ -27,4 +27,3 @@ Create a backdoored Service or Job
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
@@ -71,4 +71,3 @@ But you can find further information in [https://github.com/FrancescoDiSalesGith
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
@@ -39,4 +39,3 @@ For more information check the technique in:
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
@@ -21,4 +21,3 @@ For more informatoin about Compute and VPC (Networking) check:
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
@@ -55,4 +55,3 @@ gcloud dataflow $NAME_TEMPLATE run testing \
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
@@ -23,4 +23,3 @@ gcp-filestore-persistence.md
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
@@ -23,4 +23,3 @@ gcloud logging sinks create <sink-name> <destination> --log-filter="FILTER_CONDI
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
@@ -106,4 +106,3 @@ Some remediations for these techniques are explained in [https://www.netskope.co
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
@@ -24,4 +24,3 @@ An attacker could update the secret to:
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
@@ -40,4 +40,3 @@ Another exploit script for this method can be found [here](https://github.com/Rh
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
Reference in New Issue
Block a user