translate

This commit is contained in:
Carlos Polop
2025-01-01 21:36:15 +01:00
parent d0e6a85e6f
commit d0b9174054
243 changed files with 21 additions and 264 deletions

View File

@@ -24,4 +24,3 @@ gcloud ai-platform jobs describe <job>

View File

@@ -46,4 +46,3 @@ gcloud services api-keys list --show-deleted

View File

@@ -119,4 +119,3 @@ gcloud app ssl-certificates describe <name>

View File

@@ -94,4 +94,3 @@ gcloud artifacts docker images list-vulnerabilities projects/<proj-name>/locatio

View File

@@ -37,4 +37,3 @@ gcloud batch tasks describe projects/<proj-number>/locations/<location>/jobs/<jo

View File

@@ -231,4 +231,3 @@ SELECT catalog_name, schema_name, NULL FROM <project-name>.INFORMATION_SCHEMA.SC

View File

@@ -34,4 +34,3 @@ gcloud bigtable app-profiles describe --instance <INSTANCE> <app-prof>

View File

@@ -110,4 +110,3 @@ In the following page, you can check how to **abuse cloud function permissions t

View File

@@ -113,4 +113,3 @@ In the following page, you can check how to **abuse cloud run permissions to esc

View File

@@ -48,4 +48,3 @@ gcloud scheduler jobs describe --location us-central1 <scheduler-name>

View File

@@ -30,4 +30,3 @@ Note that Cloud Shell can be **easily disabled** for the organization.

View File

@@ -91,4 +91,3 @@ gcloud sql backups describe <backup-name> --instance <intance-name>

View File

@@ -45,4 +45,3 @@ In the following page you can check how to **abuse composer permissions to escal

View File

@@ -233,4 +233,3 @@ Check the Compute Instances privilege escalation section.

View File

@@ -105,4 +105,3 @@ A Google-managed encryption key is used by default a but a Customer-managed encr

View File

@@ -87,4 +87,3 @@ These are the needed permissions:

View File

@@ -106,4 +106,3 @@ Even if the API **doesn't allow to modify resources**, it could be possible to f

View File

@@ -27,4 +27,3 @@ gcloud dns policies list

View File

@@ -76,4 +76,3 @@ There aren't ways to escalate privileges in GCP directly abusing this service, b

View File

@@ -79,4 +79,3 @@ You may be able to access some interesting information

View File

@@ -19,4 +19,3 @@ gcloud firestore export gs://my-source-project-export/export-20190113_2109 --col

View File

@@ -228,4 +228,3 @@ In the following page you can check how to **abuse org policies permissions to e

View File

@@ -84,4 +84,3 @@ gcloud kms decrypt --ciphertext-file=[INFILE] \

View File

@@ -148,4 +148,3 @@ There aren't logs of **`testIamPermissions`**:

View File

@@ -23,4 +23,3 @@ gcloud redis instances export gs://my-bucket/my-redis-instance.rdb my-redis-inst

View File

@@ -59,4 +59,3 @@ gcloud alpha monitoring channels describe <channel>

View File

@@ -96,4 +96,3 @@ gcloud pubsub lite-operations describe <topic>

View File

@@ -55,4 +55,3 @@ An attacker could update the secret to **stop rotations** (so it won't be modifi

View File

@@ -94,4 +94,3 @@ gcp-secrets-manager-enum.md

View File

@@ -69,4 +69,3 @@ git add, commit, push...

View File

@@ -33,4 +33,3 @@ gcloud spanner instance-configs describe <name>

View File

@@ -35,4 +35,3 @@ gcloud logging buckets list

View File

@@ -158,4 +158,3 @@ In the following page you can check how to **abuse storage permissions to escala

View File

@@ -40,4 +40,3 @@ gcloud workflows executions describe projects/<proj-number>/locations/<location>