gcpHound v2.0 : Django Web UI To Analyze IAM Permissions

Setup

$ docker pull desijarvis/gcphound:v2.0$ docker run --name gcpHound -p 127.0.0.1:443:443 -it desijarvis/gcphound:v2.0 /bin/bashroot@<containerID># cd /root/gcpHound/root@<containerID># gcloud auth login --no-launch-browserroot@<containerID># gcloud config set project <project-id>root@<containerID># service mysql startroot@<containerID># service apache2 start

gcpHoundWebUI

Before Logging In

./gcpHound --runGCPHound

Logging In

Credentialsusername : admin
password : gcphoundadminUserPassword1!
gcpHound Login Page

Troubleshooting

root@<containerID># cd /var/www/gcpHoundWebUIroot@<containerID># python3 manage.py changepassword admin

Changing Password

Analyzing IAM

Hypothetical GCP Organization redteam.com
IAM Permissions for redteam-operator-1@redteam.com on Home Page
IAM Permissions for redteam-operator-1@redteam.com
IAM Permissions for redteam-operator-7@redteam.com

Caveats

In The End

CREDITS

--

--

--

Effective collaboration between red and blue can produce offensive defense a.k.a blue team quickly detecting, responding and disrupting attackers activities.

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

Docker for web developers

Troubleshooting the WSO2 MicroGateway

Improving Navigation-Based Internal links for SEO

How To Escape Tutorial Hell

A sea of white hands

How I Passed the AWS Solutions Architect Exam in a Month

Libadiff: What did you do to my audio file?

Prioritization for PMs: 5 Hazards

Removing WLAN/WWAN BIOS whitelist on a Lenovo laptop to use a custom Wi-Fi card

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Madhav Bhatt

Madhav Bhatt

Effective collaboration between red and blue can produce offensive defense a.k.a blue team quickly detecting, responding and disrupting attackers activities.

More from Medium

A misconfigured Apache Airflow to AWS Account Compromise

OWASP Zed Attack Proxy Primer

Testing WebSockets for Vulnerabilities {Part-2} The Setup.

Weakly Typed SQL Injection