GCP - Storage Post Exploitation

Jifunze kuhusu uchimbaji wa AWS kutoka sifuri hadi shujaa na htARTE (Mtaalam wa Timu Nyekundu ya AWS ya HackTricks)!

Njia nyingine za kusaidia HackTricks:

Uhifadhi wa Buluu

Kwa habari zaidi kuhusu Uhifadhi wa Buluu angalia ukurasa huu:

pageGCP - Storage Enum

Toa Upatikanaji wa Umma

Inawezekana kumpa watumiaji wa nje (walioingia kwenye GCP au la) upatikanaji wa yaliyomo kwenye vikasha. Walakini, kwa chaguo-msingi, kasha litakuwa limezimisha chaguo la kufunua hadharani kasha:

# Disable public prevention
gcloud storage buckets update gs://BUCKET_NAME --no-public-access-prevention

# Make all objects in a bucket public
gcloud storage buckets add-iam-policy-binding gs://BUCKET_NAME --member=allUsers --role=roles/storage.objectViewer
## I don't think you can make specific objects public just with IAM

# Make a bucket or object public (via ACL)
gcloud storage buckets update gs://BUCKET_NAME --add-acl-grant=entity=AllUsers,role=READER
gcloud storage objects update gs://BUCKET_NAME/OBJECT_NAME --add-acl-grant=entity=AllUsers,role=READER

Ikijaribu kutoa ACLs kwa ndoo yenye ACLs iliyozimwa utakutana na kosa hili: ERROR: HTTPError 400: Haiwezi kutumia API ya ACL kusasisha sera ya ndoo wakati ufikiaji wa kiwango cha ndoo ya kawaida umewezeshwa. Soma zaidi kwenye https://cloud.google.com/storage/docs/uniform-bucket-level-access

Kufikia ndoo zilizofunguliwa kupitia kivinjari, fikia URL https://<bucket_name>.storage.googleapis.com/ au https://<bucket_name>.storage.googleapis.com/<object_name>

Last updated