{% hint style="success" %}
Learn & practice AWS Hacking:HackTricks Training AWS Red Team Expert (ARTE)
Learn & practice GCP Hacking: HackTricks Training GCP Red Team Expert (GRTE)
Support HackTricks
- Check the subscription plans!
- Join the 💬 Discord group or the telegram group or follow us on Twitter 🐦 @hacktricks_live.
- Share hacking tricks by submitting PRs to the HackTricks and HackTricks Cloud github repos.
Before start pentesting a Digital Ocean environment there are a few basics things you need to know about how DO works to help you understand what you need to do, how to find misconfigurations and how to exploit them.
Concepts such as hierarchy, access and other basic concepts are explained in:
{% content-ref url="do-basic-information.md" %} do-basic-information.md {% endcontent-ref %}
{% embed url="https://book.hacktricks.xyz/pentesting-web/ssrf-server-side-request-forgery/cloud-ssrf" %}
To get a list of the projects and resources running on each of them from the CLI check:
{% content-ref url="do-services/do-projects.md" %} do-projects.md {% endcontent-ref %}
doctl account get
{% content-ref url="do-services/" %} do-services {% endcontent-ref %}
{% hint style="success" %}
Learn & practice AWS Hacking:HackTricks Training AWS Red Team Expert (ARTE)
Learn & practice GCP Hacking: HackTricks Training GCP Red Team Expert (GRTE)
Support HackTricks
- Check the subscription plans!
- Join the 💬 Discord group or the telegram group or follow us on Twitter 🐦 @hacktricks_live.
- Share hacking tricks by submitting PRs to the HackTricks and HackTricks Cloud github repos.