Files
hacktricks-cloud/pentesting-cloud/gcp-security/gcp-unauthenticated-enum-and-access/gcp-cloud-sql-unauthenticated-enum.md
2024-12-12 19:35:48 +01:00

3.0 KiB

GCP - Cloud SQL Unauthenticated Enum

{% hint style="success" %} Learn & practice AWS Hacking:HackTricks Training AWS Red Team Expert (ARTE)
Learn & practice GCP Hacking: HackTricks Training GCP Red Team Expert (GRTE)

Support HackTricks
{% endhint %}

Cloud SQL

For more infromation about Cloud SQL check:

{% content-ref url="../gcp-services/gcp-cloud-sql-enum.md" %} gcp-cloud-sql-enum.md {% endcontent-ref %}

Brute Force

If you have access to a Cloud SQL port because all internet is permitted or for any other reason, you can try to brute force credentials.

Check this page for different tools to burte-force different database technologies:

{% embed url="https://book.hacktricks.xyz/generic-methodologies-and-resources/brute-force" %}

Remember that with some privileges it's possible to list all the database users via GCP API.

{% hint style="success" %} Learn & practice AWS Hacking:HackTricks Training AWS Red Team Expert (ARTE)
Learn & practice GCP Hacking: HackTricks Training GCP Red Team Expert (GRTE)

Support HackTricks
{% endhint %}