Главная
Study mode:
on
1
Intro
2
DISCLAIMER!!
3
GCP 101
4
Persistence via SSH Key
5
Persistence via Service Account
6
Persistence via Start-up Script
7
SSH via Browser
8
Continued: Persistence on Project
9
Persistence on Organization
10
Enter gepHound
11
Privilege Escalation and Persistence
12
Continued: Command & Control
13
Continued: Lateral Movement
14
Data Exfiltration
15
Data Decryption
16
Closing Remarks
17
Questions ..!!??
Description:
Dive into a comprehensive 51-minute conference talk from BSidesSF 2022 exploring red team engagements in Google Cloud Platform (GCP). Learn advanced techniques for adversary simulations, including initial access, persistence methods, privilege escalation, and leveraging Google's products for command and control. Discover strategies for manipulating firewall rules, compute instances, and abusing Key Management Service and Google Cloud Storage for data decryption and exfiltration. Gain valuable insights into cloud security from experts Brad Richardson and Madhav Bhatt as they guide you through the intricacies of securing GCP environments against sophisticated attacks.

So You Think You Can Secure Your Cloud - Red Team Engagements in GCP

Security BSides San Francisco
Add to list
0:00 / 0:00