One port to serve them all - Google GCP cloud shell abuse

Tuesday
 
26
 
November
11:35 am
 - 
12:15 pm

Speakers

Hubert Lin

Hubert Lin

Sr. Staff Researcher
Netskope

Synopsis

The Cloud Shell feature from cloud service providers offers a convenient way to access resources within the cloud, significantly improving the user experience for administrators and developers. However, even though the instance has a short lifespan, granting excessive permissions could pose security risks. This talk reveals an abuse methodology that leverages a public-facing port in GCP Cloud Shell. Through manipulation in Netfilter's NAT table, it serves various internally running services such as HTTP, SOCKS, and SSH within the Cloud Shell container to the public. This configuration could be exploited by adversaries to bypass Google authentication in Web Preview feature to leak data, deliver malicious content, or pivot attacks through the Google network.

Acknowledgement of Country

We acknowledge the traditional owners and custodians of country throughout Australia and acknowledge their continuing connection to land, waters and community. We pay our respects to the people, the cultures and the elders past, present and emerging.

Acknowledgement of Country