Files
hacktricks-cloud/pentesting-cloud/gcp-security/gcp-persistence/gcp-cloud-sql-persistence.md
2024-12-12 19:35:48 +01:00

3.9 KiB

GCP - Cloud SQL Persistence

{% hint style="success" %} Learn & practice AWS Hacking:HackTricks Training AWS Red Team Expert (ARTE)
Learn & practice GCP Hacking: HackTricks Training GCP Red Team Expert (GRTE)

Support HackTricks
{% endhint %}

Cloud SQL

For more information about Cloud SQL check:

{% content-ref url="../gcp-services/gcp-cloud-sql-enum.md" %} gcp-cloud-sql-enum.md {% endcontent-ref %}

Expose the database and whitelist your IP address

A database only accessible from an internal VPC can be exposed externally and your IP address can be whitelisted so you can access it.
For more information check the technique in:

{% content-ref url="../gcp-post-exploitation/gcp-cloud-sql-post-exploitation.md" %} gcp-cloud-sql-post-exploitation.md {% endcontent-ref %}

Create a new user / Update users password / Get password of a user

To connect to a database you just need access to the port exposed by the database and a username and password. With enough privileges you could create a new user or update an existing user password.
Another option would be to brute force the password of an user by trying several password or by accessing the hashed password of the user inside the database (if possible) and cracking it.
Remember that it's possible to list the users of a database using GCP API.

{% hint style="info" %} You can create/update users using GCP API or from inside the databae if you have enough permissions. {% endhint %}

For more information check the technique in:

{% content-ref url="../gcp-post-exploitation/gcp-cloud-sql-post-exploitation.md" %} gcp-cloud-sql-post-exploitation.md {% endcontent-ref %}

{% hint style="success" %} Learn & practice AWS Hacking:HackTricks Training AWS Red Team Expert (ARTE)
Learn & practice GCP Hacking: HackTricks Training GCP Red Team Expert (GRTE)

Support HackTricks
{% endhint %}