Cookie Consent by Free Privacy Policy Generator ๐Ÿ“Œ nuvola - Tool To Dump And Perform Automatic And Manual Security Analysis On Aws Environments Configurations And Services

๐Ÿ  Team IT Security News

TSecurity.de ist eine Online-Plattform, die sich auf die Bereitstellung von Informationen,alle 15 Minuten neuste Nachrichten, Bildungsressourcen und Dienstleistungen rund um das Thema IT-Sicherheit spezialisiert hat.
Ob es sich um aktuelle Nachrichten, Fachartikel, Blogbeitrรคge, Webinare, Tutorials, oder Tipps & Tricks handelt, TSecurity.de bietet seinen Nutzern einen umfassenden รœberblick รผber die wichtigsten Aspekte der IT-Sicherheit in einer sich stรคndig verรคndernden digitalen Welt.

16.12.2023 - TIP: Wer den Cookie Consent Banner akzeptiert, kann z.B. von Englisch nach Deutsch รผbersetzen, erst Englisch auswรคhlen dann wieder Deutsch!

Google Android Playstore Download Button fรผr Team IT Security



๐Ÿ“š nuvola - Tool To Dump And Perform Automatic And Manual Security Analysis On Aws Environments Configurations And Services


๐Ÿ’ก Newskategorie: IT Security Nachrichten
๐Ÿ”— Quelle: kitploit.com

nuvola (with the lowercase n) is a tool to dump and perform automatic and manual security analysis on AWS environments configurations and services using predefined, extensible and custom rules created using a simple Yaml syntax.

The general idea behind this project is to create an abstracted digital twin of a cloud platform. For a more concrete example: nuvola reflects the BloodHound traits used for Active Directory analysis but on cloud environments (at the moment only AWS).

The usage of a graph database also increases the possibility of finding different and innovative attack paths and can be used as an offline, centralised and lightweight digital twin.


Quick Start

Requirements

  • docker-compose installed
  • an AWS account configured to be used with awscli with full access to the cloud resources, better if in ReadOnly mode (the policy arn:aws:iam::aws:policy/ReadOnlyAccess is fine)

Setup

  1. Clone the repository
git clone --depth=1 https://github.com/primait/nuvola.git; cd nuvola
  1. Create and edit, if required, the .env file to set your DB username/password/URL
cp .env_example .env;
  1. Start the Neo4j docker instance
make start
  1. Build the tool
make build

Usage

  1. Firstly you need to dump all the supported AWS services configurations and load the data into the Neo4j database:
./nuvola dump -profile default_RO -outputdir ~/DumpDumpFolder -format zip
  1. To import a previously executed dump operation into the Neo4j database:
./nuvola assess -import ~/DumpDumpFolder/nuvola-default_RO_20220901.zip
  1. To only perform static assessments on the data loaded into the Neo4j database using the predefined ruleset:
./nuvola assess
  1. Or use Neo4j Browser to manually explore the digital twin.

About nuvola

To get started with nuvola and its database schema, check out the nuvola Wiki.

No data is sent or shared with Prima Assicurazioni.

How to contribute

  • reporting bugs and issues
  • reporting new improvements
  • reviewing issues and pull requests
  • fixing bugs and issues
  • creating new rules
  • improving the overall quality

Presentations

License

nuvola uses graph theory to reveal possible attack paths and security misconfigurations on cloud environments.

This program is free software: you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version.

This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details.

You should have received a copy of the GNU General Public License along with this repository and program. If not, see http://www.gnu.org/licenses/.



...



๐Ÿ“Œ Keeping ones home tidy: Managing dependencies, configurations, and profile configurations with "guix home"


๐Ÿ“ˆ 38.92 Punkte

๐Ÿ“Œ Can I save two different desktop environment configurations and choose between them before login like two different environments?


๐Ÿ“ˆ 32.17 Punkte

๐Ÿ“Œ Nuvola Player 4.5 Integrates Progress & Volume Bars in Google Play Music, Deezer


๐Ÿ“ˆ 31.83 Punkte

๐Ÿ“Œ Frontier Nuvola: WLAN-Radios verlieren bald Gratis-Favoritenfunktion


๐Ÿ“ˆ 31.83 Punkte

๐Ÿ“Œ Low CVE-2015-9426: Manual image crop project Manual image crop


๐Ÿ“ˆ 30.7 Punkte

๐Ÿ“Œ New cloud security analysis finds default configurations and identity management are the biggest concerns


๐Ÿ“ˆ 30.29 Punkte

๐Ÿ“Œ How to Perform Manual SQL Injection While Pentesting With Single quote Error Based Parenthesis Method


๐Ÿ“ˆ 30.13 Punkte

๐Ÿ“Œ ADCSync - Use ESC1 To Perform A Makeshift DCSync And Dump Hashes


๐Ÿ“ˆ 29.35 Punkte

๐Ÿ“Œ How to Connect AirPods to Apple Watch: Automatic and Manual Methods


๐Ÿ“ˆ 28.61 Punkte

๐Ÿ“Œ Pacu - The AWS Exploitation Framework, Designed For Testing The Security Of Amazon Web Services Environments


๐Ÿ“ˆ 28.06 Punkte

๐Ÿ“Œ WordPress Update Breaks Automatic Update Featureโ€”Apply Manual Update


๐Ÿ“ˆ 27.87 Punkte

๐Ÿ“Œ Dump file creation failed due to error during dump creation


๐Ÿ“ˆ 27.66 Punkte

๐Ÿ“Œ Mssqlproxy - A Toolkit Aimed To Perform Lateral Movement In Restricted Environments Through A Compromised Microsoft SQL Server Via Socket Reuse


๐Ÿ“ˆ 27.12 Punkte

๐Ÿ“Œ Intel partners with DARPA to perform in Data Protection in Virtual Environments program


๐Ÿ“ˆ 27.12 Punkte

๐Ÿ“Œ Securing AWS Management Configurations By Combating 6 Common Threats


๐Ÿ“ˆ 26.71 Punkte

๐Ÿ“Œ Build an active learning pipeline for automatic annotation of images with AWS services


๐Ÿ“ˆ 26.31 Punkte

๐Ÿ“Œ Server configurations and Amazon Web Services pricing were included.


๐Ÿ“ˆ 26 Punkte

๐Ÿ“Œ Security platform replaces manual risk assessment with on-the-fly analysis during the build process


๐Ÿ“ˆ 25.81 Punkte

๐Ÿ“Œ Mastering Python Development Environments: A Comprehensive Guide to Virtual Environments


๐Ÿ“ˆ 24.69 Punkte

๐Ÿ“Œ Ghidra Basics - Manual Shellcode Analysis and C2 Extraction


๐Ÿ“ˆ 24.63 Punkte

๐Ÿ“Œ Configure an AWS DeepRacer environment for training and log analysis using the AWS CDK


๐Ÿ“ˆ 24.51 Punkte

๐Ÿ“Œ Leveraging Infrastructure as Code (IaC) for AWS Lambda: A Comparative Analysis of AWS SAM, Terraform, and Serverless Framework


๐Ÿ“ˆ 24.51 Punkte

๐Ÿ“Œ Azure vs AWS: A Comparative Analysis of Native Cloud Security Services


๐Ÿ“ˆ 24.26 Punkte

๐Ÿ“Œ How To Perform Sentiment Analysis and Classification on Text (In Java)


๐Ÿ“ˆ 24.06 Punkte

๐Ÿ“Œ DevSecOps with AWS โ€“ ChatOps with AWS and AWS Developer Tools โ€“ Part 1


๐Ÿ“ˆ 23.59 Punkte

๐Ÿ“Œ 5 Step Guide: How to Perform a Cyber Risk Analysis in 2022 | UpGuard


๐Ÿ“ˆ 23.32 Punkte

๐Ÿ“Œ How to Perform Exploratory Data Analysis with Python


๐Ÿ“ˆ 23.32 Punkte

๐Ÿ“Œ How to Perform Data Analysis in Python Using the OpenAI API


๐Ÿ“ˆ 23.32 Punkte

๐Ÿ“Œ PEpper - An Open Source Script To Perform Malware Static Analysis On Portable Executable


๐Ÿ“ˆ 23.32 Punkte

๐Ÿ“Œ The Definitive Guide to Top AWS Services: In-Depth Analysis and Use Cases


๐Ÿ“ˆ 23.07 Punkte

๐Ÿ“Œ Survey: 84% of Security Pros Said Their Organizations Struggled to Maintain Security Configurations in the Cloud


๐Ÿ“ˆ 22.93 Punkte

๐Ÿ“Œ Security analysis of legacy programming environments reveals critical flaws


๐Ÿ“ˆ 22.81 Punkte

๐Ÿ“Œ Sumo Logic accelerates troubleshooting and security across AWS environments


๐Ÿ“ˆ 22.62 Punkte

๐Ÿ“Œ Visual Studio Remote Office Hours - Dump file analysis


๐Ÿ“ˆ 22.37 Punkte











matomo