GCP Compute.instances.setMetadata
Sets or updates instance-level metadata on a Compute Engine VM, which can include SSH keys or startup scripts.
Adversaries may modify the SSH <code>authorized_keys</code> file to maintain persistence on a victim host. Linux distributions, macOS, and ESXi hypervisors commonly use key-based authentication to secure the authentication process of SSH sessions for remote management.
View on MITRE ATT&CK →Sets or updates instance-level metadata on a Compute Engine VM, which can include SSH keys or startup scripts.
Sets project-wide Compute Engine metadata, applied to all instances and commonly used to manage SSH keys.
Creates an EC2 key pair and returns the private key material, used for SSH authentication to EC2 instances.
Imports an existing RSA or ED25519 public key into EC2 for use as a key pair when launching instances.
Creates or updates an SSH public key resource in Azure, used to authenticate to Linux virtual machines.
Pushes an SSH public key to an EC2 instance's serial console interface, enabling SSH access over the serial port.
Pushes a temporary SSH public key to an EC2 instance via EC2 Instance Connect, valid for 60 seconds.
Imports an SSH public key into a user's GCP OS Login profile, enabling SSH access to Compute Engine instances.
Updates an existing SSH public key in a user's GCP OS Login profile.