GCP
This playbook outlines offensive security techniques in Google Cloud Platform (GCP). It is structured around the red teaming lifecycle: reconnaissance, exploitation, privilege escalation, lateral move
1. GCP Cloud Overview
Core Components
Planes of Access
2. Authentication & Credential Types
2.1 User Accounts
2.2 Service Accounts
2.3 Access Tokens
3. Enumeration
3.1 Identity Enumeration
3.2 Service Account Enumeration
3.3 Storage Enumeration
4. Exploitation
4.1 Metadata Service Abuse (IMDS Equivalent)
4.2 Using Leaked Tokens
4.3 Privilege Escalation via Service Accounts
5. Post-Exploitation
5.1 Key Vaults / Secrets
5.2 BigQuery Data Dumping
6. Lateral Movement
7. Persistence
8. Detection & Mitigation
Last updated