Category

Solutions

Category

GCP Penetration Testing: Methodology and Use Cases

Pentesting a GCP (Google Cloud Platform) infrastructure and the web applications deployed on it is a key step in identifying vulnerabilities and strengthening resilience against attacks.

This article presents the methodology adopted during a GCP infrastructure penetration test, the main types of tests performed, and some concrete examples.

How to Detect Secrets? Tools and Techniques

Before discussing techniques and tools, it is essential to define the ‘secrets’ sought during penetration tests.

These secrets are generally private character strings which, if compromised, can be used to access a system, break encryption or forge data useful for authentication. Examples include a username and password pair, API keys, private keys or a session token that is still valid.