Files
hacktricks-cloud/pentesting-cloud/gcp-security/gcp-post-exploitation/gcp-workflows-post-exploitation.md
2024-12-12 19:35:48 +01:00

2.9 KiB

GCP - Workflows Post Exploitation

{% hint style="success" %} Learn & practice AWS Hacking:HackTricks Training AWS Red Team Expert (ARTE)
Learn & practice GCP Hacking: HackTricks Training GCP Red Team Expert (GRTE)

Support HackTricks
{% endhint %}

Workflow

Basic information:

{% content-ref url="../gcp-services/gcp-workflows-enum.md" %} gcp-workflows-enum.md {% endcontent-ref %}

Post Exploitation

The post exploitation techniques are actually the same ones as the ones shared in the Workflows Privesc section:

{% content-ref url="../gcp-privilege-escalation/gcp-workflows-privesc.md" %} gcp-workflows-privesc.md {% endcontent-ref %}

{% hint style="success" %} Learn & practice AWS Hacking:HackTricks Training AWS Red Team Expert (ARTE)
Learn & practice GCP Hacking: HackTricks Training GCP Red Team Expert (GRTE)

Support HackTricks
{% endhint %}