{"id":13649493,"url":"https://github.com/ine-labs/GCPGoat","last_synced_at":"2025-04-22T14:31:57.427Z","repository":{"id":64255009,"uuid":"568696693","full_name":"ine-labs/GCPGoat","owner":"ine-labs","description":"GCPGoat : A Damn Vulnerable GCP Infrastructure","archived":false,"fork":false,"pushed_at":"2024-10-29T09:48:13.000Z","size":27242,"stargazers_count":379,"open_issues_count":1,"forks_count":84,"subscribers_count":8,"default_branch":"main","last_synced_at":"2025-04-08T10:37:04.947Z","etag":null,"topics":[],"latest_commit_sha":null,"homepage":"","language":"JavaScript","has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":"mit","status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/ine-labs.png","metadata":{"files":{"readme":"README.md","changelog":null,"contributing":null,"funding":null,"license":"LICENSE","code_of_conduct":null,"threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":null,"support":null,"governance":null,"roadmap":null,"authors":null,"dei":null,"publiccode":null,"codemeta":null}},"created_at":"2022-11-21T08:09:33.000Z","updated_at":"2025-03-26T04:51:01.000Z","dependencies_parsed_at":"2024-01-18T13:34:02.087Z","dependency_job_id":"af70e778-dc5b-4d7a-88a4-b43356b7d344","html_url":"https://github.com/ine-labs/GCPGoat","commit_stats":null,"previous_names":[],"tags_count":0,"template":false,"template_full_name":null,"repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/ine-labs%2FGCPGoat","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/ine-labs%2FGCPGoat/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/ine-labs%2FGCPGoat/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/ine-labs%2FGCPGoat/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/ine-labs","download_url":"https://codeload.github.com/ine-labs/GCPGoat/tar.gz/refs/heads/main","host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":250259077,"owners_count":21401037,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2022-07-04T15:15:14.044Z","host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":[],"created_at":"2024-08-02T02:00:17.549Z","updated_at":"2025-04-22T14:31:52.412Z","avatar_url":"https://github.com/ine-labs.png","language":"JavaScript","readme":"# GCPGoat : A Damn Vulnerable GCP Infrastructure\n\n\u003cp align=\"center\"\u003e\n  \u003cimg src=\"https://user-images.githubusercontent.com/42687376/204150661-3d576909-e271-4a3a-8996-37939f977315.jpg\"\u003e\n\u003c/p\u003e\n\nCompromising an organization's cloud infrastructure is like sitting on a gold mine for attackers. And sometimes, a simple misconfiguration or a vulnerability in web applications, is all an attacker needs to compromise the entire infrastructure. Since the cloud is relatively new, many developers are not fully aware of the threatscape and they end up deploying a vulnerable cloud infrastructure.\n\nGCPGoat is a vulnerable by design infrastructure on GCP featuring the latest released OWASP Top 10 web application security risks (2021) and other misconfiguration based on services such as IAM, Storage Bucket, Cloud Functions and Compute Engine. GCPGoat mimics real-world infrastructure but with added vulnerabilities. It features multiple escalation paths and is focused on a black-box approach.\n\nGCPGoat uses IaC (Terraform) to deploy the vulnerable cloud infrastructure on the user's GCP account. This gives the user complete control over code, infrastructure, and environment. Using GCPGoat, the user can learn/practice:\n- Cloud Pentesting/Red-teaming\n- Auditing IaC\n- Secure Coding\n- Detection and mitigation\n\nThe project will be divided into modules and each module will be a separate web application, powered by varied tech stacks and development practices. It will leverage IaC through terraform to ease the deployment process.\n\n[![Hits](https://hits.seeyoufarm.com/api/count/incr/badge.svg?url=https%3A%2F%2Fgithub.com%2Fine-labs%2FGCPGoat\u0026count_bg=%2379C83D\u0026title_bg=%23555555\u0026icon=\u0026icon_color=%23E7E7E7\u0026title=hits\u0026edge_flat=false)](https://hits.seeyoufarm.com)\n\n### Presented at\n\n* [BlackHat ASIA 2023](https://www.blackhat.com/asia-23/arsenal/schedule/index.html#gcpgoat--a-damn-vulnerable-gcp-infrastructure-31312)\n\n### Developed with :heart: by [INE](https://ine.com/) \n\n[\u003cimg src=\"https://user-images.githubusercontent.com/25884689/184508144-f0196d79-5843-4ea6-ad39-0c14cd0da54c.png\" alt=\"drawing\" width=\"200\"/\u003e](https://discord.gg/TG7bpETgbg)\n\n## Built With\n\n* Google Cloud Platform (GCP)\n* React\n* Python 3\n* Terraform\n\n## Vulnerabilities\n\nThe project is scheduled to encompass all significant vulnerabilities including the OWASP TOP 10 2021, and popular cloud misconfigurations.\nCurrently, the project  contains the following vulnerabilities/misconfigurations.\n\n* XSS\n* Insecure Direct Object reference\n* Server Side Request Forgery on Cloud Function\n* Sensitive Data Exposure and Password Reset\n* Storage Bucket Misconfigurations\n* IAM Privilege Escalations\n\n\n# Getting Started\n\n### Prerequisites\n* A GCP Account with Administrative Privileges\n\n### Installation\n\nManually installing GCPGoat would require you to follow these steps:\n\n(Note: This requires a Linux Machine, with the /bin/bash shell available)\n\n**Step 1.** Clone the repo\n```sh\ngit clone https://github.com/ine-labs/GCPGoat\n```\n\n**Step 2.** Configure the GCP User Account Credentials using gcloud CLI\n```sh\ngcloud auth application-default login\n```\n**Step 3.** Insert the Billing Account name in main.tf file\n\n```hcl\ndata \"google_billing_account\" \"acct\" {\n  display_name = \"\u003cYour Billing Account Name\u003e\"\n}\n```\n\n**Step 4.** In the same working directory use terraform to deploy GCPGoat.\n\n```sh\nterraform init\nterraform apply --auto-approve\n```\n\n# Modules\n\n## Module 1\n\nThe first module features a serverless blog application utilizing Cloud Functions, Cloud Storage Buckets, Compute Engine and Firestore. It consists of various web application vulnerabilities and facilitates exploitation of misconfigured GCP resources.\n\nEscalation Path:\n\n\u003cp align=\"center\"\u003e\n  \u003cimg src=\"https://user-images.githubusercontent.com/42687376/204155231-6e80bd8c-cb86-469e-a59b-acbec0dc8a25.png\"\u003e\n\u003c/p\u003e\n\n**Recommended Browser:** Google Chrome\n\n# Pricing\nThe resources created with the deployment of GCPGoat will not incur any charges if the GCP account is under the free tier/trial period. However, upon exhaustion/ineligibility of the free tier/trial, the following charges will apply for the US-East region:\n\nModule 1: $0.03/hour\n\n# Contributors\n\nNishant Sharma, Director, Lab Platform, INE \u003cnsharma@ine.com\u003e\n\nJeswin Mathai, Chief Architect, Lab Platform, INE  \u003cjmathai@ine.com\u003e\n\nSherin Stephen, Software Engineer (Cloud), INE \u003csstephen@ine.com\u003e\n\nDivya Nain, Software Engineer (Cloud), INE  \u003cdnain@ine.com\u003e\n\nRishappreet Singh Moon, Software Engineer (Cloud), INE \u003crmoon@ine.com\u003e \n\nLitesh Ghute, Software Engineer (Cloud), INE \u003clghute@ine.com\u003e \n\nSanjeev Mahunta, Software Engineer (Cloud), INE \u003csmahunta@ine.com\u003e\n\n# Solutions\n\nThe offensive manuals are available in the [attack-manuals](attack-manuals/) directory, and the defensive manuals are available in the [defence-manuals](defence-manuals/) directory. \n\n# Screenshots\n\nModule 1:\n\n\n\u003cp align=\"center\"\u003e\n  \u003cimg src=\"https://user-images.githubusercontent.com/42687376/204152524-48253d8e-d1ce-48ca-b60b-6a12d97aa210.png\"\u003e\n\u003c/p\u003e\n\n\u003cp align=\"center\"\u003e\n  \u003cimg src=\"https://user-images.githubusercontent.com/42687376/204152571-c99b4632-61b3-4131-85ec-58cc128cb7cd.png\"\u003e\n\u003c/p\u003e\n\n\u003cp align=\"center\"\u003e\n  \u003cimg src=\"https://user-images.githubusercontent.com/42687376/204152587-a8f9595f-7fa6-41a1-af0f-5fb4eb44da4d.png\"\u003e\n\u003c/p\u003e\n\n\u003cp align=\"center\"\u003e\n  \u003cimg src=\"https://user-images.githubusercontent.com/42687376/204152593-187e7640-94b5-4be0-b1f2-c3bb2ac954ca.png\"\u003e\n\u003c/p\u003e\n\n## Contribution Guidelines\n\n* Contributions in the form of code improvements, module updates, feature improvements, and any general suggestions are welcome. \n* Improvements to the functionalities of the current modules are also welcome. \n* The source code for each module can be found in ``modules/module-\u003cNumber\u003e/src`` this can be used to modify the existing application code.\n\n# License\n\nThis program is free software: you can redistribute it and/or modify it under the terms of the MIT License.\n\nYou should have received a copy of the MIT License along with this program. If not, see https://opensource.org/licenses/MIT.\n\n# Sister Projects\n\n- [AWSGoat](https://github.com/ine-labs/AWSGoat)\n- [AzureGoat](https://github.com/ine-labs/AzureGoat)\n- [PA Toolkit (Pentester Academy Wireshark Toolkit)](https://github.com/pentesteracademy/patoolkit)\n- [ReconPal: Leveraging NLP for Infosec](https://github.com/pentesteracademy/reconpal) \n- [VoIPShark: Open Source VoIP Analysis Platform](https://github.com/pentesteracademy/voipshark)\n- [BLEMystique](https://github.com/pentesteracademy/blemystique)\n","funding_links":[],"categories":["Sorted by Technology and Category","Online Platforms","0x03 靶场 :dart:","JavaScript"],"sub_categories":["云服务靶场"],"project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fine-labs%2FGCPGoat","html_url":"https://awesome.ecosyste.ms/projects/github.com%2Fine-labs%2FGCPGoat","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fine-labs%2FGCPGoat/lists"}