diff --git a/cloud-security/gcp-security/gcp-interesting-permissions/README.md b/cloud-security/gcp-security/gcp-interesting-permissions/README.md index 3a6154fc..766238e1 100644 --- a/cloud-security/gcp-security/gcp-interesting-permissions/README.md +++ b/cloud-security/gcp-security/gcp-interesting-permissions/README.md @@ -22,6 +22,22 @@ It's important to note also that in **GCP Service Accounts are both principals a The permissions between parenthesis indicate the permissions needed to exploit the vulnerability with `gcloud`. Those might not be needed if exploiting it through the API. {% endhint %} +## Privilege Escalation to Principals + +Check all the **known permissions** that will allow you to **escalate privileges over other principals** in: + +{% content-ref url="gcp-privesc-to-other-principals.md" %} +[gcp-privesc-to-other-principals.md](gcp-privesc-to-other-principals.md) +{% endcontent-ref %} + +## Privilege Escalation to Resources + +Check all the **known permissions** that will allow you to **escalate privileges over other resources** in: + +{% content-ref url="gcp-privesc-to-resources.md" %} +[gcp-privesc-to-resources.md](gcp-privesc-to-resources.md) +{% endcontent-ref %} + ## cloudbuild ### cloudbuild.builds.create diff --git a/cloud-security/gcp-security/gcp-interesting-permissions/gcp-privesc-to-other-principals.md b/cloud-security/gcp-security/gcp-interesting-permissions/gcp-privesc-to-other-principals.md index 6ef97973..f8e26aea 100644 --- a/cloud-security/gcp-security/gcp-interesting-permissions/gcp-privesc-to-other-principals.md +++ b/cloud-security/gcp-security/gcp-interesting-permissions/gcp-privesc-to-other-principals.md @@ -1,5 +1,10 @@ # GCP - Privesc to other Principals +{% hint style="info" %} +GCP has **hundreds of permissions**. This is just a list containing the **known** ones that could allow you to escalate to other principals.\ +If you know about any other permissions not mentioned here, **please send a PR to add it** or let me know and I will add it. +{% endhint %} + ## IAM ### iam.roles.update (iam.roles.get)