GCP - Cloud SQL Persistence
Last updated
Last updated
Learn & practice AWS Hacking:HackTricks Training AWS Red Team Expert (ARTE) Learn & practice GCP Hacking: HackTricks Training GCP Red Team Expert (GRTE)
For more information about Cloud SQL check:
GCP - Cloud SQL EnumA database only accessible from an internal VPC can be exposed externally and your IP address can be whitelisted so you can access it. For more information check the technique in:
GCP - Cloud SQL Post ExploitationTo connect to a database you just need access to the port exposed by the database and a username and password. With enough privileges you could create a new user or update an existing user password. Another option would be to brute force the password of an user by trying several password or by accessing the hashed password of the user inside the database (if possible) and cracking it. Remember that it's possible to list the users of a database using GCP API.
You can create/update users using GCP API or from inside the databae if you have enough permissions.
For more information check the technique in:
GCP - Cloud SQL Post ExploitationLearn & practice AWS Hacking:HackTricks Training AWS Red Team Expert (ARTE) Learn & practice GCP Hacking: HackTricks Training GCP Red Team Expert (GRTE)