GCP - Secretmanager Privesc

Reading time: 2 minutes

tip

Jifunze na fanya mazoezi ya AWS Hacking:HackTricks Training AWS Red Team Expert (ARTE)
Jifunze na fanya mazoezi ya GCP Hacking: HackTricks Training GCP Red Team Expert (GRTE) Jifunze na fanya mazoezi ya Azure Hacking: HackTricks Training Azure Red Team Expert (AzRTE)

Support HackTricks

secretmanager

Kwa maelezo zaidi kuhusu secretmanager:

GCP - Secrets Manager Enum

secretmanager.versions.access

Hii inakupa ufikiaji wa kusoma siri kutoka kwa meneja wa siri na huenda hii ikasaidia kupandisha madaraka (kutegemea ni taarifa gani zimehifadhiwa ndani ya siri):

bash
# Get clear-text of version 1 of secret: "<secret name>"
gcloud secrets versions access 1 --secret="<secret_name>"

Kama hii ni mbinu ya baada ya unyakuzi, inaweza kupatikana katika:

GCP - Secretmanager Post Exploitation

secretmanager.secrets.setIamPolicy

Hii inakupa ufikiaji wa kusoma siri kutoka kwa meneja wa siri, kama kutumia:

bash
gcloud secrets add-iam-policy-binding <scret-name> \
--member="serviceAccount:<sa-name>@$PROJECT_ID.iam.gserviceaccount.com" \
--role="roles/secretmanager.secretAccessor"

tip

Jifunze na fanya mazoezi ya AWS Hacking:HackTricks Training AWS Red Team Expert (ARTE)
Jifunze na fanya mazoezi ya GCP Hacking: HackTricks Training GCP Red Team Expert (GRTE) Jifunze na fanya mazoezi ya Azure Hacking: HackTricks Training Azure Red Team Expert (AzRTE)

Support HackTricks