Author

Vaadata Author

Browsing

GCP Penetration Testing: Methodology and Use Cases

Pentesting a GCP (Google Cloud Platform) infrastructure and the web applications deployed on it is a key step in identifying vulnerabilities and strengthening resilience against attacks.

This article presents the methodology adopted during a GCP infrastructure penetration test, the main types of tests performed, and some concrete examples.

Deserialisation vulnerabilities are often difficult to exploit. In most cases, you need access to the source code to identify the available classes or libraries used. This allows you to choose a suitable gadget chain or build a new one.

However, access to the source code is not always possible. It generally requires high privileges or the prior exploitation of another vulnerability.