Skip to content
  • Home
    • All Categories
    • Individual Categories
  • Recent
  • Tags
  • Popular
Collapse
Hostrisk Security Platform

Hostrisk

    • Light
    • Cloudy
    • Dim
    • Dark (Warm)
    • Dark (Cold)
    • Dark (Edge)
  1. Home
  2. Categories
  3. Research
  4. How an Attacker Can Achieve Persistence in Google Cloud Platform (GCP) with Cloud Shell

How an Attacker Can Achieve Persistence in Google Cloud Platform (GCP) with Cloud Shell

Scheduled Pinned Locked Moved Research
research
1 Posts 1 Posters 53 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • CerberusC Online
    CerberusC Online
    Cerberus
    wrote on last edited by
    #1

    IBM Security X-Force Red took a deeper look at the Google Cloud Platform (GCP) and found a potential method an attacker could use to persist in GCP via the Google Cloud Shell. Google Cloud Shell is a service that provides a web-based shell where GCP administrative activities can be performed. A web-based shell is a […]

    The post How an Attacker Can Achieve Persistence in Google Cloud Platform (GCP) with Cloud Shell appeared first on Security Intelligence.

    https://securityintelligence.com/posts/attacker-achieve-persistence-google-cloud-platform-cloud-shell/

    DISCLAIMER: Please note, that this article is not the work of (or owned by) Hostrisk.com. Attribution and copyright of this article is retained in full by the original author referred to in the Source link above

    1 Reply Last reply
    0

© 2021-2023 hostrisk.com
Contact Consent Policies
  • Login

  • Login or register to search.
  • First post
    Last post
0
  • Home
    • All Categories
    • Individual Categories
  • Recent
  • Tags
  • Popular