GCP - Logging Post Exploitation
Last updated
Last updated
Learn & practice AWS Hacking: Learn & practice GCP Hacking:
For more information check:
For other ways to disrupt monitoring check:
By default you won't get caught just for performing read actions. Fore more info check the Logging Enum section.
In and is possible to add principals to not generate logs. An attacker could abuse this to prevent being caught.
logging.logEntries.list
logging.logs.delete
logging.logEntries.create
logging.buckets.update
logging.buckets.delete
logging.links.delete
logging.views.delete
logging.views.update
logging.logMetrics.update
logging.logMetrics.delete
logging.sinks.delete
logging.sinks.update
Learn & practice AWS Hacking: Learn & practice GCP Hacking:
Check the !
Join the 💬 or the or follow us on Twitter 🐦 .
Share hacking tricks by submitting PRs to the and github repos.