GCP - Storage Post Exploitation
Last updated
Last updated
Learn & practice AWS Hacking:HackTricks Training AWS Red Team Expert (ARTE) Learn & practice GCP Hacking: HackTricks Training GCP Red Team Expert (GRTE)
Kwa maelezo zaidi kuhusu Cloud Storage angalia ukurasa huu:
GCP - Storage EnumInawezekana kutoa watumiaji wa nje (waliosajiliwa GCP au la) ufikiaji wa maudhui ya bakuli. Hata hivyo, kwa default bakuli itakuwa na chaguo la kuzima kufichua bakuli hadharani:
Ikiwa unajaribu kutoa ACLs kwa bakuli lenye ACLs zilizozimwa utaona kosa hili: ERROR: HTTPError 400: Cannot use ACL API to update bucket policy when uniform bucket-level access is enabled. Read more at https://cloud.google.com/storage/docs/uniform-bucket-level-access
Ili kufikia bakuli wazi kupitia kivinjari, tembelea URL https://<bucket_name>.storage.googleapis.com/
au https://<bucket_name>.storage.googleapis.com/<object_name>
Jifunze na fanya mazoezi ya AWS Hacking:HackTricks Training AWS Red Team Expert (ARTE) Jifunze na fanya mazoezi ya GCP Hacking: HackTricks Training GCP Red Team Expert (GRTE)