GCP - Workflows Post Exploitation

{{#include ../../../banners/hacktricks-training.md}}

Workflow

Basic information:

{{#ref}}
../gcp-services/gcp-workflows-enum.md
{{#endref}}

Post Exploitation

The post exploitation techniques are actually the same ones as the ones shared in the Workflows Privesc section:

{{#ref}}
../gcp-privilege-escalation/gcp-workflows-privesc.md
{{#endref}}

{{#include ../../../banners/hacktricks-training.md}}