Skip to content

Latest commit

 

History

History
64 lines (42 loc) · 3.37 KB

gcp-storage-persistence.md

File metadata and controls

64 lines (42 loc) · 3.37 KB

GCP - Storage Persistence

{% hint style="success" %} Learn & practice AWS Hacking:HackTricks Training AWS Red Team Expert (ARTE)
Learn & practice GCP Hacking: HackTricks Training GCP Red Team Expert (GRTE)

Support HackTricks
{% endhint %}

Storage

For more information about Cloud Storage check:

{% content-ref url="../gcp-services/gcp-storage-enum.md" %} gcp-storage-enum.md {% endcontent-ref %}

storage.hmacKeys.create

You can create an HMAC to maintain persistence over a bucket. For more information about this technique check it here.

# Create key
gsutil hmac create <sa-email>

# Configure gsutil to use it
gsutil config -a

# Use it
gsutil ls gs://[BUCKET_NAME]

Another exploit script for this method can be found here.

Give Public Access

Making a bucket publicly accessible is another way to maintain access over the bucket. Check how to do it in:

{% content-ref url="../gcp-post-exploitation/gcp-storage-post-exploitation.md" %} gcp-storage-post-exploitation.md {% endcontent-ref %}

{% hint style="success" %} Learn & practice AWS Hacking:HackTricks Training AWS Red Team Expert (ARTE)
Learn & practice GCP Hacking: HackTricks Training GCP Red Team Expert (GRTE)

Support HackTricks
{% endhint %}