GCP - Cloud Run Post Exploitation

Learn AWS hacking from zero to hero with htARTE (HackTricks AWS Red Team Expert)!

Other ways to support HackTricks:

Cloud Run

For more information about Cloud Run check:

pageGCP - Cloud Run Enum

Access the images

If you can access the container images check the code for vulnerabilities and hardcoded sensitive information. Also for sensitive information in env variables.

Modify the image

Modify the run image to steal information. For example, if it's exposing a login page, steal the credentials users are sending.

Learn AWS hacking from zero to hero with htARTE (HackTricks AWS Red Team Expert)!

Other ways to support HackTricks:

Last updated