Files
hacktricks-cloud/pentesting-cloud/gcp-security/gcp-post-exploitation/gcp-artifact-registry-post-exploitation.md
2024-12-12 19:35:48 +01:00

2.9 KiB

GCP - Artifact Registry Post Exploitation

{% hint style="success" %} Learn & practice AWS Hacking:HackTricks Training AWS Red Team Expert (ARTE)
Learn & practice GCP Hacking: HackTricks Training GCP Red Team Expert (GRTE)

Support HackTricks
{% endhint %}

Artifact Registry

For more information about Artifact Registry check:

{% content-ref url="../gcp-services/gcp-artifact-registry-enum.md" %} gcp-artifact-registry-enum.md {% endcontent-ref %}

Privesc

The Post Exploitation and Privesc techniques of Artifact Registry were mixed in:

{% content-ref url="../gcp-privilege-escalation/gcp-artifact-registry-privesc.md" %} gcp-artifact-registry-privesc.md {% endcontent-ref %}

{% hint style="success" %} Learn & practice AWS Hacking:HackTricks Training AWS Red Team Expert (ARTE)
Learn & practice GCP Hacking: HackTricks Training GCP Red Team Expert (GRTE)

Support HackTricks
{% endhint %}