GCP - Batch Privesc
Last updated
Last updated
Learn & practice AWS Hacking:HackTricks Training AWS Red Team Expert (ARTE) Learn & practice GCP Hacking: HackTricks Training GCP Red Team Expert (GRTE)
Basic information:
batch.jobs.create
, iam.serviceAccounts.actAs
It's possible to create a batch job, get a reverse shell and exfiltrate the metadata token of the SA (compute SA by default).
Learn & practice AWS Hacking:HackTricks Training AWS Red Team Expert (ARTE) Learn & practice GCP Hacking: HackTricks Training GCP Red Team Expert (GRTE)