Skip to content

Commit 6e1d6f4

Browse files
committed
fix
1 parent 16b90da commit 6e1d6f4

2 files changed

Lines changed: 3 additions & 2 deletions

File tree

src/pentesting-cloud/azure-security/az-post-exploitation/az-function-apps-post-exploitation.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,8 @@ For more information about function apps check:
1010
../az-services/az-function-apps.md
1111
{{#endref}}
1212

13-
> [!CAUTION] > **Function Apps post exploitation tricks are very related to the privilege escalation tricks** so you can find all of them there:
13+
> [!CAUTION]
14+
> **Function Apps post exploitation tricks are very related to the privilege escalation tricks** so you can find all of them there:
1415
1516
{{#ref}}
1617
../az-privilege-escalation/az-functions-app-privesc.md

src/pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-storage-privesc.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -65,7 +65,7 @@ gcloud config set pass_credentials_to_gsutil true
6565

6666
Another exploit script for this method can be found [here](https://github.com/RhinoSecurityLabs/GCP-IAM-Privilege-Escalation/blob/master/ExploitScripts/storage.hmacKeys.create.py).
6767

68-
## `storage.objects.create`, `storage.objects.delete` = Storage Write permissions
68+
### `storage.objects.create`, `storage.objects.delete` = Storage Write permissions
6969

7070
In order to **create a new object** inside a bucket you need `storage.objects.create` and, according to [the docs](https://cloud.google.com/storage/docs/access-control/iam-permissions#object_permissions), you need also `storage.objects.delete` to **modify** an existent object.
7171

0 commit comments

Comments
 (0)