Based on the in-depth blog post. A quick overview of some GCP security fundamentals, and then an interactive walkthrough of a post-exploitation scenario.
The demonstration shows examples for escalating privileges, moving laterally, and breaking out of GCP into GSuite.
Originally meant to be a talk for BSides Melbourne 2020, which was cancelled due to the global pandemic. – Chris Moberly’s outstanding blog post
*** This is a Security Bloggers Network syndicated blog from Infosecurity.US authored by Marc Handelman. Read the original post at: https://www.youtube-nocookie.com/embed/OJ_wUcVrGx0
Get your CompTIA A+, Network+ White Hat-Hacker, Certified Web Intelligence Analyst and more starting at $35 a month. Click here for more details.