GCP - Filestore Post Exploitation
Last updated
Last updated
Learn & practice AWS Hacking:HackTricks Training AWS Red Team Expert (ARTE) Learn & practice GCP Hacking: HackTricks Training GCP Red Team Expert (GRTE)
For more information about Filestore check:
GCP - Filestore EnumA shared filesystem might contain sensitive information interesting from an attackers perspective. With access to the Filestore it's possible to mount it:
To find the IP address of a filestore insatnce check the enumeration section of the page:
GCP - Filestore EnumIf the attacker isn't in an IP address with access over the share, but you have enough permissions to modify it, it's possible to remover the restrictions or access over it. It's also possible to grant more privileges over your IP address to have admin access over the share:
If there is a backup it's possible to restore it in an existing or in a new instance so its information becomes accessible:
If you don't have access over a share and don't want to modify it, it's possible to create a backup of it and restore it as previously mentioned:
Learn & practice AWS Hacking:HackTricks Training AWS Red Team Expert (ARTE) Learn & practice GCP Hacking: HackTricks Training GCP Red Team Expert (GRTE)