GCP - Security Post Exploitation

Jifunze na fanya mazoezi ya AWS Hacking:HackTricks Training AWS Red Team Expert (ARTE) Jifunze na fanya mazoezi ya GCP Hacking: HackTricks Training GCP Red Team Expert (GRTE)

Support HackTricks

Usalama

Kwa maelezo zaidi angalia:

GCP - Security Enum

securitycenter.muteconfigs.create

Zuia uzalishaji wa matokeo ambayo yanaweza kugundua mshambulizi kwa kuunda muteconfig:

# Create Muteconfig
gcloud scc muteconfigs create my-mute-config --organization=123 --description="This is a test mute config" --filter="category=\"XSS_SCRIPTING\""

securitycenter.muteconfigs.update

Zuia utengenezaji wa matokeo ambayo yanaweza kugundua mshambulizi kwa kusasisha muteconfig:

# Update Muteconfig
gcloud scc muteconfigs update my-test-mute-config --organization=123 --description="This is a test mute config" --filter="category=\"XSS_SCRIPTING\""

securitycenter.findings.bulkMuteUpdate

Kuzima matokeo kulingana na kichujio:

# Mute based on a filter
gcloud scc findings bulk-mute --organization=929851756715 --filter="category=\"XSS_SCRIPTING\""

Matokeo yaliyonyamazishwa hayataonekana kwenye dashibodi ya SCC na ripoti.

securitycenter.findings.setMute

Nyamazisha matokeo kulingana na chanzo, matokeo...

gcloud scc findings set-mute 789 --organization=organizations/123 --source=456 --mute=MUTED

securitycenter.findings.update

Sasisha matokeo ili kuonyesha taarifa zisizo sahihi:

gcloud scc findings update `myFinding` --organization=123456 --source=5678 --state=INACTIVE

Jifunze na fanya mazoezi ya AWS Hacking:HackTricks Training AWS Red Team Expert (ARTE) Jifunze na fanya mazoezi ya GCP Hacking: HackTricks Training GCP Red Team Expert (GRTE)

Support HackTricks

Last updated