translate

This commit is contained in:
Carlos Polop
2025-01-01 21:36:15 +01:00
parent d0e6a85e6f
commit d0b9174054
243 changed files with 21 additions and 264 deletions

View File

@@ -23,4 +23,3 @@ Check how to do this in:

View File

@@ -23,4 +23,3 @@ If yoi could just modify the code of a running version or create a new one yo co

View File

@@ -44,4 +44,3 @@ https://book.hacktricks.xyz/pentesting-web/dependency-confusion

View File

@@ -23,4 +23,3 @@ Grant further access over datasets, tables, rows and columns to compromised user

View File

@@ -21,4 +21,3 @@ For more info about Cloud Functions check:

View File

@@ -27,4 +27,3 @@ Create a backdoored Service or Job

View File

@@ -71,4 +71,3 @@ But you can find further information in [https://github.com/FrancescoDiSalesGith

View File

@@ -39,4 +39,3 @@ For more information check the technique in:

View File

@@ -21,4 +21,3 @@ For more informatoin about Compute and VPC (Networking) check:

View File

@@ -55,4 +55,3 @@ gcloud dataflow $NAME_TEMPLATE run testing \

View File

@@ -23,4 +23,3 @@ gcp-filestore-persistence.md

View File

@@ -23,4 +23,3 @@ gcloud logging sinks create <sink-name> <destination> --log-filter="FILTER_CONDI

View File

@@ -106,4 +106,3 @@ Some remediations for these techniques are explained in [https://www.netskope.co

View File

@@ -24,4 +24,3 @@ An attacker could update the secret to:

View File

@@ -40,4 +40,3 @@ Another exploit script for this method can be found [here](https://github.com/Rh