GCP - Filestore Post Exploitation
Tip
Jifunze na fanya mazoezi ya AWS Hacking:
HackTricks Training AWS Red Team Expert (ARTE)
Jifunze na fanya mazoezi ya GCP Hacking:HackTricks Training GCP Red Team Expert (GRTE)
Jifunze na fanya mazoezi ya Azure Hacking:
HackTricks Training Azure Red Team Expert (AzRTE)
Support HackTricks
- Angalia mpango wa usajili!
- Jiunge na 💬 kikundi cha Discord au kikundi cha telegram au tufuatilie kwenye Twitter 🐦 @hacktricks_live.
- Shiriki mbinu za hacking kwa kuwasilisha PRs kwa HackTricks na HackTricks Cloud repos za github.
Filestore
Kwa maelezo zaidi kuhusu Filestore angalia:
Mount Filestore
Filesystem iliyoshirikiwa inaweza kuwa na taarifa nyeti zinazovutia kwa mtazamo wa mshambuliaji. Kwa kupata ufikiaji wa Filestore, inawezekana mount it:
Mount Filestore filesystem
```bash sudo apt-get update sudo apt-get install nfs-common # Check the share name showmount -eIli kupata anwani ya IP ya filestore instance angalia sehemu ya enumeration ya ukurasa:
Ondoa Vikwazo na upate ruhusa za ziada
Ikiwa mshambuliaji hayupo kwenye anwani ya IP yenye ufikiaji kwenye share, lakini una ruhusa za kutosha za kuibadilisha, inawezekana kuondoa vikwazo au kuongeza ufikiaji. Pia inawezekana kumpa anwani yako ya IP ruhusa za ziada ili kupata ufikiaji wa admin kwenye share:
Sasisha Filestore instance ili kuruhusu ufikiaji
```bash gcloud filestore instances update nfstest \ --zone=Contents of nfs.json
{
“–file-share”:
{
“capacity”: “1024”,
“name”: “
</details>
### Rejesha chelezo
Ikiwa kuna chelezo, inawezekana **kurejesha** kwenye instance iliyopo au kwenye instance mpya ili taarifa zake ziweze kupatikana:
<details>
<summary>Unda instance mpya na rejesha chelezo</summary>
```bash
# Create a new filestore if you don't want to modify the old one
gcloud filestore instances create <new-instance-name> \
--zone=<zone> \
--tier=STANDARD \
--file-share=name=vol1,capacity=1TB \
--network=name=default,reserved-ip-range=10.0.0.0/29
# Restore a backups in a new instance
gcloud filestore instances restore <new-instance-name> \
--zone=<zone> \
--file-share=<instance-file-share-name> \
--source-backup=<backup-name> \
--source-backup-region=<backup-region>
# Follow the previous section commands to mount it
Tengeneza nakala ya chelezo na uirejeshe
Ikiwa hauna ufikiaji kwa share na hutaki kuibadilisha, inawezekana kutengeneza nakala ya chelezo yake na kuirejesha kama ilivyotajwa hapo awali:
Tengeneza nakala ya chelezo na uirejeshe katika instance mpya
```bash # Create share backup gcloud filestore backups createFollow the previous section commands to restore it and mount it
</details>
> [!TIP]
> Jifunze na fanya mazoezi ya AWS Hacking:<img src="../../../../../images/arte.png" alt="" style="width:auto;height:24px;vertical-align:middle;">[**HackTricks Training AWS Red Team Expert (ARTE)**](https://training.hacktricks.xyz/courses/arte)<img src="../../../../../images/arte.png" alt="" style="width:auto;height:24px;vertical-align:middle;">\
> Jifunze na fanya mazoezi ya GCP Hacking: <img src="../../../../../images/grte.png" alt="" style="width:auto;height:24px;vertical-align:middle;">[**HackTricks Training GCP Red Team Expert (GRTE)**](https://training.hacktricks.xyz/courses/grte)<img src="../../../../../images/grte.png" alt="" style="width:auto;height:24px;vertical-align:middle;">
> Jifunze na fanya mazoezi ya Azure Hacking: <img src="../../../../../images/azrte.png" alt="" style="width:auto;height:24px;vertical-align:middle;">[**HackTricks Training Azure Red Team Expert (AzRTE)**](https://training.hacktricks.xyz/courses/azrte)<img src="../../../../../images/azrte.png" alt="" style="width:auto;height:24px;vertical-align:middle;">
>
> <details>
>
> <summary>Support HackTricks</summary>
>
> - Angalia [**mpango wa usajili**](https://github.com/sponsors/carlospolop)!
> - **Jiunge na** 💬 [**kikundi cha Discord**](https://discord.gg/hRep4RUj7f) au [**kikundi cha telegram**](https://t.me/peass) au **tufuatilie** kwenye **Twitter** 🐦 [**@hacktricks_live**](https://twitter.com/hacktricks_live)**.**
> - **Shiriki mbinu za hacking kwa kuwasilisha PRs kwa** [**HackTricks**](https://github.com/carlospolop/hacktricks) na [**HackTricks Cloud**](https://github.com/carlospolop/hacktricks-cloud) repos za github.
>
> </details>
HackTricks Cloud

