3.0 KiB
GCP - Cloud SQL Unauthenticated Enum
{% hint style="success" %}
Learn & practice AWS Hacking:
HackTricks Training AWS Red Team Expert (ARTE)
Learn & practice GCP Hacking:
HackTricks Training GCP Red Team Expert (GRTE)
Support HackTricks
- Check the subscription plans!
- Join the 💬 Discord group or the telegram group or follow us on Twitter 🐦 @hacktricks_live.
- Share hacking tricks by submitting PRs to the HackTricks and HackTricks Cloud github repos.
Cloud SQL
For more infromation about Cloud SQL check:
{% content-ref url="../gcp-services/gcp-cloud-sql-enum.md" %} gcp-cloud-sql-enum.md {% endcontent-ref %}
Brute Force
If you have access to a Cloud SQL port because all internet is permitted or for any other reason, you can try to brute force credentials.
Check this page for different tools to burte-force different database technologies:
{% embed url="https://book.hacktricks.xyz/generic-methodologies-and-resources/brute-force" %}
Remember that with some privileges it's possible to list all the database users via GCP API.
{% hint style="success" %}
Learn & practice AWS Hacking:
HackTricks Training AWS Red Team Expert (ARTE)
Learn & practice GCP Hacking:
HackTricks Training GCP Red Team Expert (GRTE)
Support HackTricks
- Check the subscription plans!
- Join the 💬 Discord group or the telegram group or follow us on Twitter 🐦 @hacktricks_live.
- Share hacking tricks by submitting PRs to the HackTricks and HackTricks Cloud github repos.