Files
hacktricks-cloud/pentesting-cloud/gcp-security/gcp-persistence/gcp-storage-persistence.md
2024-12-12 19:35:48 +01:00

3.4 KiB

GCP - Storage Persistence

{% hint style="success" %} Learn & practice AWS Hacking:HackTricks Training AWS Red Team Expert (ARTE)
Learn & practice GCP Hacking: HackTricks Training GCP Red Team Expert (GRTE)

Support HackTricks
{% endhint %}

Storage

For more information about Cloud Storage check:

{% content-ref url="../gcp-services/gcp-storage-enum.md" %} gcp-storage-enum.md {% endcontent-ref %}

storage.hmacKeys.create

You can create an HMAC to maintain persistence over a bucket. For more information about this technique check it here.

# Create key
gsutil hmac create <sa-email>

# Configure gsutil to use it
gsutil config -a

# Use it
gsutil ls gs://[BUCKET_NAME]

Another exploit script for this method can be found here.

Give Public Access

Making a bucket publicly accessible is another way to maintain access over the bucket. Check how to do it in:

{% content-ref url="../gcp-post-exploitation/gcp-storage-post-exploitation.md" %} gcp-storage-post-exploitation.md {% endcontent-ref %}

{% hint style="success" %} Learn & practice AWS Hacking:HackTricks Training AWS Red Team Expert (ARTE)
Learn & practice GCP Hacking: HackTricks Training GCP Red Team Expert (GRTE)

Support HackTricks
{% endhint %}