GCP - Storage Unauthenticated Enum
Learn & practice AWS Hacking:HackTricks Training AWS Red Team Expert (ARTE) Learn & practice GCP Hacking: HackTricks Training GCP Red Team Expert (GRTE)
Storage
For more information about Storage check:
GCP - Storage EnumPublic Bucket Brute Force
The format of an URL to access a bucket is https://storage.googleapis.com/<bucket-name>
.
The following tools can be used to generate variations of the name given and search for miss-configured buckets with that names:
Also the tools mentioned in:
GCP - Unauthenticated Enum & AccessIf you find that you can access a bucket you might be able to escalate even further, check:
GCP - Public Buckets Privilege EscalationSearch Open Buckets in Current Account
With the following script gathered from here you can find all the open buckets:
Learn & practice AWS Hacking:HackTricks Training AWS Red Team Expert (ARTE) Learn & practice GCP Hacking: HackTricks Training GCP Red Team Expert (GRTE)
Last updated