Files
hacktricks-cloud/pentesting-cloud/digital-ocean-pentesting/do-services/do-projects.md
2024-12-12 19:35:48 +01:00

2.9 KiB

DO - Projects

{% hint style="success" %} Learn & practice AWS Hacking:HackTricks Training AWS Red Team Expert (ARTE)
Learn & practice GCP Hacking: HackTricks Training GCP Red Team Expert (GRTE)

Support HackTricks
{% endhint %}

Basic Information

project is just a container for all the services (droplets, spaces, databases, kubernetes...) running together inside of it.
For more info check:

{% content-ref url="../do-basic-information.md" %} do-basic-information.md {% endcontent-ref %}

Enumeration

It's possible to enumerate all the projects a user have access to and all the resources that are running inside a project very easily:

doctl projects list # Get projects
doctl projects resources list <proj-id> # Get all the resources of a project

{% hint style="success" %} Learn & practice AWS Hacking:HackTricks Training AWS Red Team Expert (ARTE)
Learn & practice GCP Hacking: HackTricks Training GCP Red Team Expert (GRTE)

Support HackTricks
{% endhint %}