1. 👽 Welcome!
  2. HackTricks Cloud
  3. About the Author$$external:https://book.hacktricks.xyz/welcome/about-the-author$$
  4. HackTricks Values & faq$$external:https://book.hacktricks.xyz/welcome/hacktricks-values-and-faq$$
  5. 🏭 Pentesting CI/CD
  6. Pentesting CI/CD Methodology
  7. Github Security
    1. Abusing Github Actions
      1. Gh Actions - Artifact Poisoning
      2. GH Actions - Cache Poisoning
      3. Gh Actions - Context Script Injections
    2. Accessible Deleted Data in Github
    3. Basic Github Information
  8. Gitea Security
    1. Basic Gitea Information
  9. Concourse Security
    1. Concourse Architecture
    2. Concourse Lab Creation
    3. Concourse Enumeration & Attacks
  10. CircleCI Security
  11. TravisCI Security
    1. Basic TravisCI Information
  12. Jenkins Security
    1. Basic Jenkins Information
    2. Jenkins RCE with Groovy Script
    3. Jenkins RCE Creating/Modifying Project
    4. Jenkins RCE Creating/Modifying Pipeline
    5. Jenkins Arbitrary File Read to RCE via "Remember Me"
    6. Jenkins Dumping Secrets from Groovy
  13. Apache Airflow Security
    1. Airflow Configuration
    2. Airflow RBAC
  14. Terraform Security
  15. Atlantis Security
  16. Cloudflare Security
    1. Cloudflare Domains
    2. Cloudflare Zero Trust Network
  17. Okta Security
    1. Okta Hardening
  18. Serverless.com Security
  19. Supabase Security
  20. Ansible Tower / AWX / Automation controller Security
  21. Vercel Security
  22. TODO
  23. ⛈️ Pentesting Cloud
  24. Pentesting Cloud Methodology
  25. Kubernetes Pentesting
    1. Kubernetes Basics
    2. Pentesting Kubernetes Services
      1. Kubelet Authentication & Authorization
    3. Exposing Services in Kubernetes
    4. Attacking Kubernetes from inside a Pod
    5. Kubernetes Enumeration
    6. Kubernetes Role-Based Access Control(RBAC)
    7. Abusing Roles/ClusterRoles in Kubernetes
      1. Pod Escape Privileges
      2. Kubernetes Roles Abuse Lab
    8. Kubernetes Namespace Escalation
    9. Kubernetes External Secret Operator
    10. Kubernetes Pivoting to Clouds
    11. Kubernetes Network Attacks
    12. Kubernetes Hardening
      1. Kubernetes SecurityContext(s)
    13. Kubernetes OPA Gatekeeper
      1. Kubernetes OPA Gatekeeper bypass
    14. Kubernetes Kyverno
      1. Kubernetes Kyverno bypass
    15. Kubernetes ValidatingWebhookConfiguration
  26. GCP Pentesting
    1. GCP - Basic Information
      1. GCP - Federation Abuse
    2. GCP - Permissions for a Pentest
    3. GCP - Post Exploitation
      1. GCP - App Engine Post Exploitation
      2. GCP - Artifact Registry Post Exploitation
      3. GCP - Cloud Build Post Exploitation
      4. GCP - Cloud Functions Post Exploitation
      5. GCP - Cloud Run Post Exploitation
      6. GCP - Cloud Shell Post Exploitation
      7. GCP - Cloud SQL Post Exploitation
      8. GCP - Compute Post Exploitation
      9. GCP - Filestore Post Exploitation
      10. GCP - IAM Post Exploitation
      11. GCP - KMS Post Exploitation
      12. GCP - Logging Post Exploitation
      13. GCP - Monitoring Post Exploitation
      14. GCP - Pub/Sub Post Exploitation
      15. GCP - Secretmanager Post Exploitation
      16. GCP - Security Post Exploitation
      17. GCP - Workflows Post Exploitation
      18. GCP - Storage Post Exploitation
    4. GCP - Privilege Escalation
      1. GCP - Apikeys Privesc
      2. GCP - AppEngine Privesc
      3. GCP - Artifact Registry Privesc
      4. GCP - Batch Privesc
      5. GCP - BigQuery Privesc
      6. GCP - ClientAuthConfig Privesc
      7. GCP - Cloudbuild Privesc
      8. GCP - Cloudfunctions Privesc
      9. GCP - Cloudidentity Privesc
      10. GCP - Cloud Scheduler Privesc
      11. GCP - Compute Privesc
        1. GCP - Add Custom SSH Metadata
      12. GCP - Composer Privesc
      13. GCP - Container Privesc
      14. GCP - Deploymentmaneger Privesc
      15. GCP - IAM Privesc
      16. GCP - KMS Privesc
      17. GCP - Orgpolicy Privesc
      18. GCP - Pubsub Privesc
      19. GCP - Resourcemanager Privesc
      20. GCP - Run Privesc
      21. GCP - Secretmanager Privesc
      22. GCP - Serviceusage Privesc
      23. GCP - Sourcerepos Privesc
      24. GCP - Storage Privesc
      25. GCP - Workflows Privesc
      26. GCP - Generic Permissions Privesc
      27. GCP - Network Docker Escape
      28. GCP - local privilege escalation ssh pivoting
    5. GCP - Persistence
      1. GCP - API Keys Persistence
      2. GCP - App Engine Persistence
      3. GCP - Artifact Registry Persistence
      4. GCP - BigQuery Persistence
      5. GCP - Cloud Functions Persistence
      6. GCP - Cloud Run Persistence
      7. GCP - Cloud Shell Persistence
      8. GCP - Cloud SQL Persistence
      9. GCP - Compute Persistence
      10. GCP - Dataflow Persistence
      11. GCP - Filestore Persistence
      12. GCP - Logging Persistence
      13. GCP - Secret Manager Persistence
      14. GCP - Storage Persistence
      15. GCP - Token Persistance
    6. GCP - Services
      1. GCP - AI Platform Enum
      2. GCP - API Keys Enum
      3. GCP - App Engine Enum
      4. GCP - Artifact Registry Enum
      5. GCP - Batch Enum
      6. GCP - Bigquery Enum
      7. GCP - Bigtable Enum
      8. GCP - Cloud Build Enum
      9. GCP - Cloud Functions Enum
      10. GCP - Cloud Run Enum
      11. GCP - Cloud Shell Enum
      12. GCP - Cloud SQL Enum
      13. GCP - Cloud Scheduler Enum
      14. GCP - Compute Enum
        1. GCP - Compute Instances
        2. GCP - VPC & Networking
      15. GCP - Composer Enum
      16. GCP - Containers & GKE Enum
      17. GCP - DNS Enum
      18. GCP - Filestore Enum
      19. GCP - Firebase Enum
      20. GCP - Firestore Enum
      21. GCP - IAM, Principals & Org Policies Enum
      22. GCP - KMS Enum
      23. GCP - Logging Enum
      24. GCP - Memorystore Enum
      25. GCP - Monitoring Enum
      26. GCP - Pub/Sub Enum
      27. GCP - Secrets Manager Enum
      28. GCP - Security Enum
      29. GCP - Source Repositories Enum
      30. GCP - Spanner Enum
      31. GCP - Stackdriver Enum
      32. GCP - Storage Enum
      33. GCP - Workflows Enum
    7. GCP <--> Workspace Pivoting
      1. GCP - Understanding Domain-Wide Delegation
    8. GCP - Unauthenticated Enum & Access
      1. GCP - API Keys Unauthenticated Enum
      2. GCP - App Engine Unauthenticated Enum
      3. GCP - Artifact Registry Unauthenticated Enum
      4. GCP - Cloud Build Unauthenticated Enum
      5. GCP - Cloud Functions Unauthenticated Enum
      6. GCP - Cloud Run Unauthenticated Enum
      7. GCP - Cloud SQL Unauthenticated Enum
      8. GCP - Compute Unauthenticated Enum
      9. GCP - IAM, Principals & Org Unauthenticated Enum
      10. GCP - Source Repositories Unauthenticated Enum
      11. GCP - Storage Unauthenticated Enum
        1. GCP - Public Buckets Privilege Escalation
  27. GWS - Workspace Pentesting
    1. GWS - Post Exploitation
    2. GWS - Persistence
    3. GWS - Workspace Sync Attacks (GCPW, GCDS, GPS, Directory Sync with AD & EntraID)
      1. GWS - Admin Directory Sync
      2. GCDS - Google Cloud Directory Sync
      3. GCPW - Google Credential Provider for Windows
      4. GPS - Google Password Sync
    4. GWS - Google Platforms Phishing
      1. GWS - App Scripts
  28. AWS Pentesting
    1. AWS - Basic Information
      1. AWS - Federation Abuse
    2. AWS - Permissions for a Pentest
    3. AWS - Persistence
      1. AWS - API Gateway Persistence
      2. AWS - Cognito Persistence
      3. AWS - DynamoDB Persistence
      4. AWS - EC2 Persistence
      5. AWS - ECR Persistence
      6. AWS - ECS Persistence
      7. AWS - Elastic Beanstalk Persistence
      8. AWS - EFS Persistence
      9. AWS - IAM Persistence
      10. AWS - KMS Persistence
      11. AWS - Lambda Persistence
        1. AWS - Abusing Lambda Extensions
        2. AWS - Lambda Layers Persistence
      12. AWS - Lightsail Persistence
      13. AWS - RDS Persistence
      14. AWS - S3 Persistence
      15. AWS - SNS Persistence
      16. AWS - Secrets Manager Persistence
      17. AWS - SQS Persistence
      18. AWS - SSM Perssitence
      19. AWS - Step Functions Persistence
      20. AWS - STS Persistence
    4. AWS - Post Exploitation
      1. AWS - API Gateway Post Exploitation
      2. AWS - CloudFront Post Exploitation
      3. AWS - CodeBuild Post Exploitation
        1. AWS Codebuild - Token Leakage
      4. AWS - Control Tower Post Exploitation
      5. AWS - DLM Post Exploitation
      6. AWS - DynamoDB Post Exploitation
      7. AWS - EC2, EBS, SSM & VPC Post Exploitation
        1. AWS - EBS Snapshot Dump
        2. AWS - Malicious VPC Mirror
      8. AWS - ECR Post Exploitation
      9. AWS - ECS Post Exploitation
      10. AWS - EFS Post Exploitation
      11. AWS - EKS Post Exploitation
      12. AWS - Elastic Beanstalk Post Exploitation
      13. AWS - IAM Post Exploitation
      14. AWS - KMS Post Exploitation
      15. AWS - Lambda Post Exploitation
        1. AWS - Steal Lambda Requests
      16. AWS - Lightsail Post Exploitation
      17. AWS - Organizations Post Exploitation
      18. AWS - RDS Post Exploitation
      19. AWS - S3 Post Exploitation
      20. AWS - Secrets Manager Post Exploitation
      21. AWS - SES Post Exploitation
      22. AWS - SNS Post Exploitation
      23. AWS - SQS Post Exploitation
      24. AWS - SSO & identitystore Post Exploitation
      25. AWS - Step Functions Post Exploitation
      26. AWS - STS Post Exploitation
      27. AWS - VPN Post Exploitation
    5. AWS - Privilege Escalation
      1. AWS - Apigateway Privesc
      2. AWS - Chime Privesc
      3. AWS - Codebuild Privesc
      4. AWS - Codepipeline Privesc
      5. AWS - Codestar Privesc
        1. codestar:CreateProject, codestar:AssociateTeamMember
        2. iam:PassRole, codestar:CreateProject
      6. AWS - Cloudformation Privesc
        1. iam:PassRole, cloudformation:CreateStack,and cloudformation:DescribeStacks
      7. AWS - Cognito Privesc
      8. AWS - Datapipeline Privesc
      9. AWS - Directory Services Privesc
      10. AWS - DynamoDB Privesc
      11. AWS - EBS Privesc
      12. AWS - EC2 Privesc
      13. AWS - ECR Privesc
      14. AWS - ECS Privesc
      15. AWS - EFS Privesc
      16. AWS - Elastic Beanstalk Privesc
      17. AWS - EMR Privesc
      18. AWS - EventBridge Scheduler Privesc
      19. AWS - Gamelift
      20. AWS - Glue Privesc
      21. AWS - IAM Privesc
      22. AWS - KMS Privesc
      23. AWS - Lambda Privesc
      24. AWS - Lightsail Privesc
      25. AWS - Mediapackage Privesc
      26. AWS - MQ Privesc
      27. AWS - MSK Privesc
      28. AWS - RDS Privesc
      29. AWS - Redshift Privesc
      30. AWS - Route53 Privesc
      31. AWS - SNS Privesc
      32. AWS - SQS Privesc
      33. AWS - SSO & identitystore Privesc
      34. AWS - Organizations Privesc
      35. AWS - S3 Privesc
      36. AWS - Sagemaker Privesc
      37. AWS - Secrets Manager Privesc
      38. AWS - SSM Privesc
      39. AWS - Step Functions Privesc
      40. AWS - STS Privesc
      41. AWS - WorkDocs Privesc
    6. AWS - Services
      1. AWS - Security & Detection Services
        1. AWS - CloudTrail Enum
        2. AWS - CloudWatch Enum
        3. AWS - Config Enum
        4. AWS - Control Tower Enum
        5. AWS - Cost Explorer Enum
        6. AWS - Detective Enum
        7. AWS - Firewall Manager Enum
        8. AWS - GuardDuty Enum
        9. AWS - Inspector Enum
        10. AWS - Macie Enum
        11. AWS - Security Hub Enum
        12. AWS - Shield Enum
        13. AWS - Trusted Advisor Enum
        14. AWS - WAF Enum
      2. AWS - API Gateway Enum
      3. AWS - Certificate Manager (ACM) & Private Certificate Authority (PCA)
      4. AWS - CloudFormation & Codestar Enum
      5. AWS - CloudHSM Enum
      6. AWS - CloudFront Enum
      7. AWS - Codebuild Enum
      8. AWS - Cognito Enum
        1. Cognito Identity Pools
        2. Cognito User Pools
      9. AWS - DataPipeline, CodePipeline & CodeCommit Enum
      10. AWS - Directory Services / WorkDocs Enum
      11. AWS - DocumentDB Enum
      12. AWS - DynamoDB Enum
      13. AWS - EC2, EBS, ELB, SSM, VPC & VPN Enum
        1. AWS - Nitro Enum
        2. AWS - VPC & Networking Basic Information
      14. AWS - ECR Enum
      15. AWS - ECS Enum
      16. AWS - EKS Enum
      17. AWS - Elastic Beanstalk Enum
      18. AWS - ElastiCache
      19. AWS - EMR Enum
      20. AWS - EFS Enum
      21. AWS - EventBridge Scheduler Enum
      22. AWS - Kinesis Data Firehose Enum
      23. AWS - IAM, Identity Center & SSO Enum
      24. AWS - KMS Enum
      25. AWS - Lambda Enum
      26. AWS - Lightsail Enum
      27. AWS - MQ Enum
      28. AWS - MSK Enum
      29. AWS - Organizations Enum
      30. AWS - Redshift Enum
      31. AWS - Relational Database (RDS) Enum
      32. AWS - Route53 Enum
      33. AWS - Secrets Manager Enum
      34. AWS - SES Enum
      35. AWS - SNS Enum
      36. AWS - SQS Enum
      37. AWS - S3, Athena & Glacier Enum
      38. AWS - Step Functions Enum
      39. AWS - STS Enum
      40. AWS - Other Services Enum
    7. AWS - Unauthenticated Enum & Access
      1. AWS - Accounts Unauthenticated Enum
      2. AWS - API Gateway Unauthenticated Enum
      3. AWS - Cloudfront Unauthenticated Enum
      4. AWS - Cognito Unauthenticated Enum
      5. AWS - CodeBuild Unauthenticated Access
      6. AWS - DocumentDB Unauthenticated Enum
      7. AWS - DynamoDB Unauthenticated Access
      8. AWS - EC2 Unauthenticated Enum
      9. AWS - ECR Unauthenticated Enum
      10. AWS - ECS Unauthenticated Enum
      11. AWS - Elastic Beanstalk Unauthenticated Enum
      12. AWS - Elasticsearch Unauthenticated Enum
      13. AWS - IAM & STS Unauthenticated Enum
      14. AWS - Identity Center & SSO Unauthenticated Enum
      15. AWS - IoT Unauthenticated Enum
      16. AWS - Kinesis Video Unauthenticated Enum
      17. AWS - Lambda Unauthenticated Access
      18. AWS - Media Unauthenticated Enum
      19. AWS - MQ Unauthenticated Enum
      20. AWS - MSK Unauthenticated Enum
      21. AWS - RDS Unauthenticated Enum
      22. AWS - Redshift Unauthenticated Enum
      23. AWS - SQS Unauthenticated Enum
      24. AWS - SNS Unauthenticated Enum
      25. AWS - S3 Unauthenticated Enum
  29. Azure Pentesting
    1. Az - Basic Information
      1. Az - Tokens & Public Applications
    2. Az - Enumeration Tools
    3. Az - Unauthenticated Enum & Initial Entry
      1. Az - OAuth Apps Phishing
      2. Az - VMs Unath
      3. Az - Device Code Authentication Phishing
      4. Az - Password Spraying
    4. Az - Services
      1. Az - Entra ID (AzureAD) & Azure IAM
      2. Az - ACR
      3. Az - Application Proxy
      4. Az - ARM Templates / Deployments
      5. Az - Automation Account
        1. Az - State Configuration RCE
      6. Az - Azure App Services
      7. Az - Intune
      8. Az - File Shares
      9. Az - Function Apps
      10. Az - Key Vault
      11. Az - Logic Apps
      12. Az - Management Groups, Subscriptions & Resource Groups
      13. Az - Queue Storage
      14. Az - Service Bus
      15. Az - SQL
      16. Az - Static Web Applications
      17. Az - Storage Accounts & Blobs
      18. Az - Table Storage
      19. Az - Virtual Machines & Network
        1. Az - Azure Network
    5. Az - Permissions for a Pentest
    6. Az - Lateral Movement (Cloud - On-Prem)
      1. Az AD Connect - Hybrid Identity
        1. Az- Synchronising New Users
        2. Az - Default Applications
        3. Az - Cloud Kerberos Trust
        4. Az - Federation
        5. Az - PHS - Password Hash Sync
        6. Az - PTA - Pass-through Authentication
        7. Az - Seamless SSO
        8. Az - Arc vulnerable GPO Deploy Script
      2. Az - Local Cloud Credentials
      3. Az - Pass the Cookie
      4. Az - Pass the Certificate
      5. Az - Pass the PRT
      6. Az - Phishing Primary Refresh Token (Microsoft Entra)
      7. Az - Processes Memory Access Token
      8. Az - Primary Refresh Token (PRT)
    7. Az - Post Exploitation
      1. Az - Blob Storage Post Exploitation
      2. Az - File Share Post Exploitation
      3. Az - Function Apps Post Exploitation
      4. Az - Key Vault Post Exploitation
      5. Az - Queue Storage Post Exploitation
      6. Az - Service Bus Post Exploitation
      7. Az - Table Storage Post Exploitation
      8. Az - SQL Post Exploitation
      9. Az - VMs & Network Post Exploitation
    8. Az - Privilege Escalation
      1. Az - Azure IAM Privesc (Authorization)
      2. Az - App Services Privesc
      3. Az - EntraID Privesc
        1. Az - Conditional Access Policies & MFA Bypass
        2. Az - Dynamic Groups Privesc
      4. Az - Functions App Privesc
      5. Az - Key Vault Privesc
      6. Az - Queue Storage Privesc
      7. Az - Service Bus Privesc
      8. Az - Virtual Machines & Network Privesc
      9. Az - Static Web App Privesc
      10. Az - Storage Privesc
      11. Az - SQL Privesc
    9. Az - Persistence
      1. Az - Queue Storage Persistence
      2. Az - VMs Persistence
      3. Az - Storage Persistence
    10. Az - Device Registration
  30. Digital Ocean Pentesting
    1. DO - Basic Information
    2. DO - Permissions for a Pentest
    3. DO - Services
      1. DO - Apps
      2. DO - Container Registry
      3. DO - Databases
      4. DO - Droplets
      5. DO - Functions
      6. DO - Images
      7. DO - Kubernetes (DOKS)
      8. DO - Networking
      9. DO - Projects
      10. DO - Spaces
      11. DO - Volumes
  31. IBM Cloud Pentesting
    1. IBM - Hyper Protect Crypto Services
    2. IBM - Hyper Protect Virtual Server
    3. IBM - Basic Information
  32. OpenShift Pentesting
    1. OpenShift - Basic information
    2. Openshift - SCC
    3. OpenShift - Jenkins
      1. OpenShift - Jenkins Build Pod Override
    4. OpenShift - Privilege Escalation
      1. OpenShift - Missing Service Account
      2. OpenShift - Tekton
      3. OpenShift - SCC bypass
  33. 🛫 Pentesting Network Services
  34. HackTricks Pentesting Network$$external:https://book.hacktricks.xyz/generic-methodologies-and-resources/pentesting-network$$
  35. HackTricks Pentesting Services$$external:https://book.hacktricks.xyz/network-services-pentesting/pentesting-ssh$$