Skip to content

Latest commit

 

History

History
48 lines (32 loc) · 2.97 KB

gcp-secret-manager-persistence.md

File metadata and controls

48 lines (32 loc) · 2.97 KB

GCP - Secret Manager Persistence

{% hint style="success" %} Learn & practice AWS Hacking:HackTricks Training AWS Red Team Expert (ARTE)
Learn & practice GCP Hacking: HackTricks Training GCP Red Team Expert (GRTE)

Support HackTricks
{% endhint %}

Secret Manager

Find more information about Secret Manager in:

{% content-ref url="../gcp-services/gcp-secrets-manager-enum.md" %} gcp-secrets-manager-enum.md {% endcontent-ref %}

Rotation misuse

An attacker could update the secret to:

  • Stop rotations so the secret won't be modified
  • Make rotations much less often so the secret won't be modified
  • Publish the rotation message to a different pub/sub
  • Modify the rotation code being executed. This happens in a different service, probably in a Cloud Function, so the attacker will need privileged access over the Cloud Function or any other service.

{% hint style="success" %} Learn & practice AWS Hacking:HackTricks Training AWS Red Team Expert (ARTE)
Learn & practice GCP Hacking: HackTricks Training GCP Red Team Expert (GRTE)

Support HackTricks
{% endhint %}