Ausnahme gefangen: SSL certificate problem: certificate is not yet valid ๐Ÿ“Œ CDK - Zero Dependency Container Penetration Toolkit

๐Ÿ  Team IT Security News

TSecurity.de ist eine Online-Plattform, die sich auf die Bereitstellung von Informationen,alle 15 Minuten neuste Nachrichten, Bildungsressourcen und Dienstleistungen rund um das Thema IT-Sicherheit spezialisiert hat.
Ob es sich um aktuelle Nachrichten, Fachartikel, Blogbeitrรคge, Webinare, Tutorials, oder Tipps & Tricks handelt, TSecurity.de bietet seinen Nutzern einen umfassenden รœberblick รผber die wichtigsten Aspekte der IT-Sicherheit in einer sich stรคndig verรคndernden digitalen Welt.

16.12.2023 - TIP: Wer den Cookie Consent Banner akzeptiert, kann z.B. von Englisch nach Deutsch รผbersetzen, erst Englisch auswรคhlen dann wieder Deutsch!

Google Android Playstore Download Button fรผr Team IT Security



๐Ÿ“š CDK - Zero Dependency Container Penetration Toolkit


๐Ÿ’ก Newskategorie: IT Security Nachrichten
๐Ÿ”— Quelle: feedproxy.google.com


CDK is an open-sourced container penetration toolkit, designed for offering stable exploitation in different slimmed containers without any OS dependency. It comes with useful net-tools and many powerful PoCs/EXPs helps you to escape container and takeover K8s cluster easily.

Currently still under development, submit issues or mail i@cdxy.me if you need any help.


Installation

Download latest release in: https://github.com/cdk-team/CDK/releases/

Drop executable files into target container and start testing.


Usage
Usage:
cdk evaluate [--full]
cdk run (--list | <exploit> [<args>...])
cdk auto-escape <cmd>
cdk <tool> [<args>...]

Evaluate:
cdk evaluate Gather information to find weakness inside container.
cdk evaluate --full Enable file scan during information gathering.

Exploit:
cdk run --list List all available exploits.
cdk run <exploit> [<args>...] Run single exploit, docs in https://github.com/cdk-team/CDK/wiki

Auto Escape:
cdk auto-escape <cmd> Escape container in different ways then let target execute <cmd>.

Tool:
vi <file> Edit files in container like "vi" command.
ps Show process information like "ps -ef" command.
nc [options] Create TCP tunnel.
ifconfig Show network information.
kcurl <path> (get|post) <uri> <data> Make request to K8s api-server.
ucurl (get|post) <socket> <uri> <data> Make request to docker unix socket.
probe <ip> <port> <parallel> <timeout-ms> TCP port scan, example: cdk probe 10.0.1.0-255 80,8080-9443 50 1000

Options:
-h --help Show this help msg.
-v --version Show version.

Features

CDK have three modules:

  1. Evaluate: gather information inside container to find potential weakness.
  2. Exploit: for container escaping, persistance and lateral movement
  3. Tool: network-tools and APIs for TCP/HTTP requests, tunnels and K8s cluster management.

Evaluate Module

Usage

cdk evaluate [--full]

This command will run the scripts below without local file scanning, using --full to enable all.

Tactics Script Supported Usage/Example
Information Gathering OS Basic Info
โœ”
link
Information Gathering Available Capabilities
โœ”
link
Information Gathering Available Linux Commands
โœ”
link
Information Gathering Mounts
โœ”
link
Information Gathering Net Namespace
โœ”
link
Information Gathering Sensitive ENV
โœ”
link
Information Gathering Sensitive Process
โœ”
link
Information Gathering Sensitive Local Files
โœ”
link
Discovery K8s Api-server Info
โœ”
link
Discovery K8s Service-account Info
โœ”
link
Discovery Cloud Provider Metadata API
โœ”
link

Exploit Module

List all available exploits:

cdk run --list

Run targeted exploit:

cdk run <script-name> [options]
Tactic Technique CDK Exploit Name Supported Doc
Escaping docker-runc CVE-2019-5736 runc-pwn
โœ”
Escaping docker-cp CVE-2019-14271
Escaping containerd-shim CVE-2020-15257 shim-pwn
โœ”
link
Escaping dirtycow CVE-2016-5159
Escaping docker.sock PoC (DIND attack) docker-sock-check
โœ”
link
Escaping docker.sock Backdoor Image Deploy docker-sock-deploy
โœ”
link
Escaping Device Mount Escaping mount-disk
โœ”
link
Escaping Cgroups Escaping mount-cgroup
โœ”
link
Escaping Procfs Escaping mount-procfs
โœ”
link
Escaping Ptrace Escaping PoC check-ptrace
โœ”
link
Discovery K8s Component Probe service-probe
โœ”
link
Discovery Dump Istio Sidecar Meta istio-check
โœ”
link
Lateral Movement K8s Service Account Control
Lateral Movement Attack K8s api-server
Lateral Movement Attack K8s Kubelet
Lateral Movement Attack K8s Dashboard
Lateral Movement Attack K8s Helm
Lateral Movement Attack K8s Etcd
Lateral Movement Attack Private Docker Registry
Remote Control Reverse Shell reverse-shell
โœ”
link
Credential Access Access Key Scanning ak-leakage
โœ”
link
Credential Access Dump K8s Secrets k8s-secret-dump
โœ”
link
Credential Access Dump K8s Config k8s-configmap-dump
โœ”
link
Persistence Deploy WebShell
Persistence Deploy Backdoor Pod k8s-backdoor-daemonset
โœ”
link
Persistence Deploy Shadow K8s api-server k8s-shadow-apiserver
โœ”
link
Persistence K8s MITM Attack (CVE-2020-8554) k8s-mitm-clusterip
โœ”
link
Persistence Deploy K8s CronJob
Defense Evasion Disable K8s Audit

Tool Module

Running commands like in Linux, little different in input-args, see the usage link.

cdk nc [options]
cdk ps
Command Description Supported Usage/Example
nc TCP Tunnel
โœ”
link
ps Process Information
โœ”
link
ifconfig Network Information
โœ”
link
vi Edit Files
โœ”
link
kcurl Request to K8s api-server
โœ”
link
dcurl Request to Docker HTTP API
ucurl Request to Docker Unix Socket
โœ”
link
rcurl Request to Docker Registry API
probe IP/Port Scanning
โœ”
link

Developer Docs

TODO
  1. Echo loader for delivering CDK into target container via Web RCE.
  2. EDR defense evasion.
  3. Compile optimization.
  4. Dev docs


...



๐Ÿ“Œ Dependency (Supply Chain) Analysis & Remediation - Dependabot / Snyk / Fossa / Jfrog Xray / OWASP Dependency Check


๐Ÿ“ˆ 31.54 Punkte

๐Ÿ“Œ Samsung says the only cure for tech dependency is more tech dependency


๐Ÿ“ˆ 31.54 Punkte

๐Ÿ“Œ La soluciรณn definitiva: (Dependency injection, Dependency inversion, Inversion of control y Hexagonal architecture)


๐Ÿ“ˆ 31.54 Punkte

๐Ÿ“Œ Security: Mehrere Probleme in osp-director-agent-container osp-director-operator-container und osp-director-downloader-container (Red Hat)


๐Ÿ“ˆ 27.53 Punkte

๐Ÿ“Œ A Deep Dive into Container Identification and Dependency Management


๐Ÿ“ˆ 24.95 Punkte

๐Ÿ“Œ Penetration Testing Bootcamp - Penetration Testing Methodologies


๐Ÿ“ˆ 23.04 Punkte

๐Ÿ“Œ Penetration Testing Bootcamp - Penetration Testing Terminology


๐Ÿ“ˆ 23.04 Punkte

๐Ÿ“Œ Penetration Testing as a Service (PTaaS): the evolution of Penetration Testing at AT&T


๐Ÿ“ˆ 23.04 Punkte

๐Ÿ“Œ TIDoS Framework -Web Penetration Testing Toolkit for Reconnaissance


๐Ÿ“ˆ 22.21 Punkte

๐Ÿ“Œ Penetration Testing Toolkit Includes Exploit For 'Incredibly Dangerous' Bluekeep Vulnerability


๐Ÿ“ˆ 22.21 Punkte

๐Ÿ“Œ Ausprobiert: BlackArch Linux als umfangreiches Penetration-Testing-Toolkit


๐Ÿ“ˆ 22.21 Punkte

๐Ÿ“Œ badKarma - Advanced Network Reconnaissance Toolkit For Penetration Testing


๐Ÿ“ˆ 22.21 Punkte

๐Ÿ“Œ SPARTA โ€“ Network Penetration Testing GUI Toolkit


๐Ÿ“ˆ 22.21 Punkte

๐Ÿ“Œ O365-Attack-Toolkit - A Toolkit To Attack Office365


๐Ÿ“ˆ 21.38 Punkte

๐Ÿ“Œ Firmware Analysis Toolkit - Toolkit To Emulate Firmware And Analyse It For Security Vulnerabilities


๐Ÿ“ˆ 21.38 Punkte

๐Ÿ“Œ IoT-Implant-Toolkit - Toolkit For Implant Attack Of IoT Devices


๐Ÿ“ˆ 21.38 Punkte

๐Ÿ“Œ Announcing a new name for the UWP Community Toolkit: Windows Community Toolkit


๐Ÿ“ˆ 21.38 Punkte

๐Ÿ“Œ Name clash with KDE MAUI toolkit by Microsoft MAUI toolkit


๐Ÿ“ˆ 21.38 Punkte

๐Ÿ“Œ IBM/fhe-toolkit-linux: IBM Fully Homomorphic Encryption Toolkit For Linux. - GitHub


๐Ÿ“ˆ 21.38 Punkte

๐Ÿ“Œ .NET Community Toolkit: Neue Version 8.0 bringt neues MVVM Toolkit und mehr


๐Ÿ“ˆ 21.38 Punkte

๐Ÿ“Œ MSMG ToolKit 12.9 mit optimiertem Toolkit-Code und Korrekturen - Deskmodder.de


๐Ÿ“ˆ 21.38 Punkte

๐Ÿ“Œ WP Toolkit 6.1 Releaseโ€ฆ & Introducing WP Toolkit Deluxe


๐Ÿ“ˆ 21.38 Punkte

๐Ÿ“Œ Toolkit - The Essential Toolkit For Reversing, Malware Analysis, And Cracking


๐Ÿ“ˆ 21.38 Punkte

๐Ÿ“Œ Use CDK To Deploy a Complete Solution With MSK Serverless, App Runner, EKS and DynamoDB


๐Ÿ“ˆ 20.73 Punkte

๐Ÿ“Œ Deploying Next.js 13 with Amplify CDK


๐Ÿ“ˆ 20.73 Punkte

๐Ÿ“Œ Set up Amazon SageMaker Studio with Jupyter Lab 3 using the AWS CDK


๐Ÿ“ˆ 20.73 Punkte

๐Ÿ“Œ Easy CDK Deep Learning EC2 Instances


๐Ÿ“ˆ 20.73 Punkte











matomo