Plundering GCP - Escalating Privileges, Moving Laterally, and Stealing Secrets in Google Cloud
Popped a shell on a Google Compute Engine instance? Found some juicy creds for a corporate Gmail user? Let's turn that foothold into total annihilation! Tune in for tips on escalating privileges, moving laterally, and searching for secrets in Google Cloud Platform.
We'll start with a basic overview of security concepts inside Google Cloud. Then, we'll cover a breach scenario and how you, the attacker, can work to discover your surroundings and begin the exciting process of post-exploitation. The talk will touch on common mistakes that leave these environments vulnerable and will go into specific detail for interacting with many of the services inside GCP.
Don't let the Active Directory folks have all the fun, the cloud can be vulnerable too! Hackers, come and learn some new tricks. Blue Teamers, decide what's worth detecting. System Admins, understand the impact of your architecture decisions. All are welcome!
The research powering this talk is derived from the real-life antics of the internal Red Team at GitLab, who specialise in hacking zero-trust, cloud native environments.
Chris is a hacker. He is lucky enough to be paid to hack stuff, as well. He commits hacky code under the name "initstring" and occasionally writes about breaking things at https://initblog.com.