Files
hacktricks-cloud/pentesting-cloud/gcp-security/gcp-unauthenticated-enum-and-access/gcp-app-engine-unauthenticated-enum.md
2024-12-12 19:35:48 +01:00

3.1 KiB

GCP - App Engine Unauthenticated Enum

{% hint style="success" %} Learn & practice AWS Hacking:HackTricks Training AWS Red Team Expert (ARTE)
Learn & practice GCP Hacking: HackTricks Training GCP Red Team Expert (GRTE)

Support HackTricks
{% endhint %}

App Engine

For more information about App Engine check:

{% content-ref url="../gcp-services/gcp-app-engine-enum.md" %} gcp-app-engine-enum.md {% endcontent-ref %}

Brute Force Subdomains

As mentioned the URL assigned to App Engine web pages is <project-uniq-name>.appspot.com and if a service name is used it'll be: <servicename>-dot-<project-uniq-name>.appspot.com.

As the project-uniq-name can be set by the person creating the project, they might be not that random and brute-forcing them could find App Engine web apps exposed by companies.

You could use tools like the ones indicated in:

{% content-ref url="./" %} . {% endcontent-ref %}

{% hint style="success" %} Learn & practice AWS Hacking:HackTricks Training AWS Red Team Expert (ARTE)
Learn & practice GCP Hacking: HackTricks Training GCP Red Team Expert (GRTE)

Support HackTricks
{% endhint %}