From 9e1974f07e390adca207cf0c4c7f4c428b7ab174 Mon Sep 17 00:00:00 2001 From: CPol Date: Thu, 30 May 2024 22:28:11 +0000 Subject: [PATCH] GITBOOK-617: No subject --- .../gcp-privilege-escalation/gcp-bigquery-privesc.md | 6 ++++-- .../gcp-security/gcp-services/gcp-bigquery-enum.md | 4 ++++ 2 files changed, 8 insertions(+), 2 deletions(-) diff --git a/pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-bigquery-privesc.md b/pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-bigquery-privesc.md index e1d126225b..3acec8a3cb 100644 --- a/pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-bigquery-privesc.md +++ b/pentesting-cloud/gcp-security/gcp-privilege-escalation/gcp-bigquery-privesc.md @@ -9,7 +9,7 @@ Other ways to support HackTricks: * If you want to see your **company advertised in HackTricks** or **download HackTricks in PDF** Check the [**SUBSCRIPTION PLANS**](https://github.com/sponsors/carlospolop)! * Get the [**official PEASS & HackTricks swag**](https://peass.creator-spring.com) * Discover [**The PEASS Family**](https://opensea.io/collection/the-peass-family), our collection of exclusive [**NFTs**](https://opensea.io/collection/the-peass-family) -* **Join the** 💬 [**Discord group**](https://discord.gg/hRep4RUj7f) or the [**telegram group**](https://t.me/peass) or **follow** us on **Twitter** 🐦 [**@hacktricks_live**](https://twitter.com/hacktricks_live)**.** +* **Join the** 💬 [**Discord group**](https://discord.gg/hRep4RUj7f) or the [**telegram group**](https://t.me/peass) or **follow** us on **Twitter** 🐦 [**@hacktricks\_live**](https://twitter.com/hacktricks\_live)**.** * **Share your hacking tricks by submitting PRs to the** [**HackTricks**](https://github.com/carlospolop/hacktricks) and [**HackTricks Cloud**](https://github.com/carlospolop/hacktricks-cloud) github repos. @@ -77,6 +77,8 @@ Just this permission allows to **update your access over a BigQuery dataset by m bq show --format=prettyjson : > acl.json ## Give permissions to the desired user bq update --source acl.json : +## Read it with +bq head $PROJECT_ID:. ``` ### `bigquery.tables.setIamPolicy` @@ -123,7 +125,7 @@ Other ways to support HackTricks: * If you want to see your **company advertised in HackTricks** or **download HackTricks in PDF** Check the [**SUBSCRIPTION PLANS**](https://github.com/sponsors/carlospolop)! * Get the [**official PEASS & HackTricks swag**](https://peass.creator-spring.com) * Discover [**The PEASS Family**](https://opensea.io/collection/the-peass-family), our collection of exclusive [**NFTs**](https://opensea.io/collection/the-peass-family) -* **Join the** 💬 [**Discord group**](https://discord.gg/hRep4RUj7f) or the [**telegram group**](https://t.me/peass) or **follow** us on **Twitter** 🐦 [**@hacktricks_live**](https://twitter.com/hacktricks_live)**.** +* **Join the** 💬 [**Discord group**](https://discord.gg/hRep4RUj7f) or the [**telegram group**](https://t.me/peass) or **follow** us on **Twitter** 🐦 [**@hacktricks\_live**](https://twitter.com/hacktricks\_live)**.** * **Share your hacking tricks by submitting PRs to the** [**HackTricks**](https://github.com/carlospolop/hacktricks) and [**HackTricks Cloud**](https://github.com/carlospolop/hacktricks-cloud) github repos. diff --git a/pentesting-cloud/gcp-security/gcp-services/gcp-bigquery-enum.md b/pentesting-cloud/gcp-security/gcp-services/gcp-bigquery-enum.md index fd54a7672c..aadb970f13 100644 --- a/pentesting-cloud/gcp-security/gcp-services/gcp-bigquery-enum.md +++ b/pentesting-cloud/gcp-security/gcp-services/gcp-bigquery-enum.md @@ -163,6 +163,10 @@ gcloud data-catalog taxonomies describe --location= gcloud data-catalog taxonomies list --location #Find more gcloud data-catalog taxonomies get-iam-policy --location= +# Get jobs executed +bq ls --jobs=true --all=true +bq --location= show --format=prettyjson --job=true + # Misc bq show --encryption_service_account # Get encryption service account ```