mirror of
https://github.com/HackTricks-wiki/hacktricks-cloud.git
synced 2026-01-19 16:10:30 -08:00
translate
This commit is contained in:
@@ -4,4 +4,3 @@
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
@@ -24,4 +24,3 @@ gcloud ai-platform jobs describe <job>
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
@@ -46,4 +46,3 @@ gcloud services api-keys list --show-deleted
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
@@ -119,4 +119,3 @@ gcloud app ssl-certificates describe <name>
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
@@ -94,4 +94,3 @@ gcloud artifacts docker images list-vulnerabilities projects/<proj-name>/locatio
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
@@ -37,4 +37,3 @@ gcloud batch tasks describe projects/<proj-number>/locations/<location>/jobs/<jo
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
@@ -231,4 +231,3 @@ SELECT catalog_name, schema_name, NULL FROM <project-name>.INFORMATION_SCHEMA.SC
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
@@ -34,4 +34,3 @@ gcloud bigtable app-profiles describe --instance <INSTANCE> <app-prof>
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
@@ -173,4 +173,3 @@ done
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
@@ -110,4 +110,3 @@ In the following page, you can check how to **abuse cloud function permissions t
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
@@ -113,4 +113,3 @@ In the following page, you can check how to **abuse cloud run permissions to esc
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
@@ -48,4 +48,3 @@ gcloud scheduler jobs describe --location us-central1 <scheduler-name>
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
@@ -30,4 +30,3 @@ Note that Cloud Shell can be **easily disabled** for the organization.
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
@@ -91,4 +91,3 @@ gcloud sql backups describe <backup-name> --instance <intance-name>
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
@@ -45,4 +45,3 @@ In the following page you can check how to **abuse composer permissions to escal
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
@@ -233,4 +233,3 @@ Check the Compute Instances privilege escalation section.
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
@@ -105,4 +105,3 @@ A Google-managed encryption key is used by default a but a Customer-managed encr
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
@@ -87,4 +87,3 @@ These are the needed permissions:
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
@@ -106,4 +106,3 @@ Even if the API **doesn't allow to modify resources**, it could be possible to f
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
@@ -27,4 +27,3 @@ gcloud dns policies list
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
@@ -76,4 +76,3 @@ There aren't ways to escalate privileges in GCP directly abusing this service, b
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
@@ -79,4 +79,3 @@ You may be able to access some interesting information
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
@@ -19,4 +19,3 @@ gcloud firestore export gs://my-source-project-export/export-20190113_2109 --col
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
@@ -228,4 +228,3 @@ In the following page you can check how to **abuse org policies permissions to e
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
@@ -84,4 +84,3 @@ gcloud kms decrypt --ciphertext-file=[INFILE] \
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
@@ -148,4 +148,3 @@ There aren't logs of **`testIamPermissions`**:
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
@@ -23,4 +23,3 @@ gcloud redis instances export gs://my-bucket/my-redis-instance.rdb my-redis-inst
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
@@ -59,4 +59,3 @@ gcloud alpha monitoring channels describe <channel>
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
@@ -96,4 +96,3 @@ gcloud pubsub lite-operations describe <topic>
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
@@ -55,4 +55,3 @@ An attacker could update the secret to **stop rotations** (so it won't be modifi
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
@@ -94,4 +94,3 @@ gcp-secrets-manager-enum.md
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
@@ -69,4 +69,3 @@ git add, commit, push...
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
@@ -33,4 +33,3 @@ gcloud spanner instance-configs describe <name>
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
@@ -35,4 +35,3 @@ gcloud logging buckets list
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
@@ -158,4 +158,3 @@ In the following page you can check how to **abuse storage permissions to escala
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
@@ -40,4 +40,3 @@ gcloud workflows executions describe projects/<proj-number>/locations/<location>
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
Reference in New Issue
Block a user