Skip to content

Latest commit

 

History

History
48 lines (32 loc) · 2.87 KB

gcp-secretmanager-post-exploitation.md

File metadata and controls

48 lines (32 loc) · 2.87 KB

GCP - Secretmanager Post Exploitation

{% hint style="success" %} Learn & practice AWS Hacking:HackTricks Training AWS Red Team Expert (ARTE)
Learn & practice GCP Hacking: HackTricks Training GCP Red Team Expert (GRTE)

Support HackTricks
{% endhint %}

Secretmanager

For more information about Secret Manager check:

{% content-ref url="../gcp-services/gcp-secrets-manager-enum.md" %} gcp-secrets-manager-enum.md {% endcontent-ref %}

secretmanager.versions.access

This give you access to read the secrets from the secret manager and maybe this could help to escalate privielegs (depending on which information is sotred inside the secret):

# Get clear-text of version 1 of secret: "<secret name>"
gcloud secrets versions access 1 --secret="<secret_name>"

{% hint style="success" %} Learn & practice AWS Hacking:HackTricks Training AWS Red Team Expert (ARTE)
Learn & practice GCP Hacking: HackTricks Training GCP Red Team Expert (GRTE)

Support HackTricks
{% endhint %}