Ausnahme gefangen: SSL certificate problem: certificate is not yet valid ๐Ÿ“Œ Aaia - AWS Identity And Access Management Visualizer And Anomaly Finder

๐Ÿ  Team IT Security News

TSecurity.de ist eine Online-Plattform, die sich auf die Bereitstellung von Informationen,alle 15 Minuten neuste Nachrichten, Bildungsressourcen und Dienstleistungen rund um das Thema IT-Sicherheit spezialisiert hat.
Ob es sich um aktuelle Nachrichten, Fachartikel, Blogbeitrรคge, Webinare, Tutorials, oder Tipps & Tricks handelt, TSecurity.de bietet seinen Nutzern einen umfassenden รœberblick รผber die wichtigsten Aspekte der IT-Sicherheit in einer sich stรคndig verรคndernden digitalen Welt.

16.12.2023 - TIP: Wer den Cookie Consent Banner akzeptiert, kann z.B. von Englisch nach Deutsch รผbersetzen, erst Englisch auswรคhlen dann wieder Deutsch!

Google Android Playstore Download Button fรผr Team IT Security



๐Ÿ“š Aaia - AWS Identity And Access Management Visualizer And Anomaly Finder


๐Ÿ’ก Newskategorie: IT Security Nachrichten
๐Ÿ”— Quelle: feedproxy.google.com


Aaia (pronounced as shown here ) helps in visualizing AWS IAM and Organizations in a graph format with help of Neo4j. This helps in identifying the outliers easily. Since it is based on neo4j , one can query the graph using cypher queries to find the anomalies.
Aaia also supports modules to programatically fetch data from neo4j database and process it in a custom fashion. This is mostly useful if any complex comparision or logic has to be applied which otherwise would not be easy through cypher queries.
Aaia was initially intended to be a tool to enumerate privelege esclation possibilities and find loop holes in AWS IAM. It was inspired from the quote by @JohnLaTwC
"Defenders think in lists. Attackers think in graphs. As long as this is true, attackers win."

Why the name "Aaia" ?
Aaia in Tamil means grandma. In general, Aaia knows everything about the family. She can easily connect who is related to whom; and how ;and give you the connection within a split second. She is a living graph database. :P
Since "Aaia" (this tool) also does more or less the same, hence the name.

Installation

Install the neo4j Database
Instructions here
Setup the username , password and bolt connection uri in Aaia.conf file. An example format is given in Aaia.conf file already.

Install OS dependency

Debian :-
apt-get install awscli jq

Redhat / Fedora / Centos / Amazon Linux :-
yum install awscli jq

Note:
These packages are needed for Aaia_aws_collector.sh script. Ensure these packages are present in the base system from where the collector script is being run.

Clone this repository
git clone https://github.com/rams3sh/Aaia
cd Aaia/

Create a virtual environment
python3 -m venv env

Activate the virtual environment
source env/bin/activate
Note: Aaia depends on pyjq library which is not stable in windows currently. Hence Aaia is not supported for Windows OS.

Install the dependencies
python -m pip install -r requirements.txt

Using Aaia

Setting up Permissions in AWS
Aaia would require following AWS permissions for collector script to collect relevant data from AWS
iam:GenerateCredentialReport
iam:GetCredentialReport
iam:GetAccountAuthorizationDetails
iam:ListUsers
iam:GetUser
iam:ListGroups
iam:ListRoles
iam:GetRole
iam:GetPolicy
iam:GetAccountPasswordPolicy
iam:GetAccountSummary
iam:ListAccountAliases
organizations:ListAccountsForParent
organizations:ListOrganizationalUnitsForParent
organizations:DescribeOrganization
organizations:ListRoots
organizations:ListAccounts
organizations:ListTagsForResource
organizations:ListPolicies
organizations:ListTargetsForPolicy
organizations:DescribePolicy
organizations:ListAWSServiceAccessForOrganization
"Organizations" related permissions can be ommitted. However , all the above mentioned "IAM" related permissions are necessary.
Ensure the permissions are available to the user / role / any aws principal which will be used for collection of data for the collector script.

Collecting data from AWS
Ensure you have aws credentials configured. Refer this for help.
Once the crendential is setup.
Run:-
./Aaia_aws_collector.sh <profile_name>
Ensure the output format of the aws profile being used for data collection is set to json as Aaia expects the data collected to be in json format.

Note:-
In case of a requirement where data has to be collected from another instance; copy "Aaia_aws_collector.sh" file to the remote instance , run it and copy the generated "offline_data" folder to the Aaia path in the instance where Aaia is setup and carry on with following steps. This will be helpful in cases of consulting or client audit.

Loading the collected data to Neo4j DB
python Aaia.py -n <profile_name> -a load_data
-n supports "all" as value which means load all data collected and present within offline_data folder.

Note:
Please ensure you do not have profile as "all" in the credentials file as it may conflict with the argument. :P
Now we are ready to use Aaia.

Audit IAM through a custom module
As of now , a sample module is given as a skeleton example. One can consider this as a reference for building custom modules.
python Aaia.py -n all -m iam_sample_audit

Thanks to
Aaia is influenced and inspired from various amazing open source projects. Huge Shoutout to :-

Aaia in Action


Screenshots
A sample visual of a dummy AWS Account's IAM


A sample visual of a result of a cypher query to find all relations of a user in AWS IAM


TO DO
  • Write a detailed documentation for understanding Aaia's Neo4j DB Schema
  • Write a detailed documentation for developing custom modules for Aaia
  • Write custom modules to evaluate 28 AWS privelege escalation methods identified by RhinoSecurity.
  • Provide a cheatsheet of queries for identifying simple issues in AWS IAM
  • Extend Aaia to other cloud providers.


...



๐Ÿ“Œ Was there creation of Linux an anomaly? Is a similar anomaly possible for movie devices?


๐Ÿ“ˆ 36.32 Punkte

๐Ÿ“Œ http://www.aaia.gov.et


๐Ÿ“ˆ 33.25 Punkte

๐Ÿ“Œ http://www.aaia.gov.et


๐Ÿ“ˆ 33.25 Punkte

๐Ÿ“Œ Finder Windows 1.5.2 - Access macOS Finder windows easily.


๐Ÿ“ˆ 32.68 Punkte

๐Ÿ“Œ Duplicate File Finder Remover 7.0.5 - Professional duplicate finder and cleaner.


๐Ÿ“ˆ 28.92 Punkte

๐Ÿ“Œ WiFi Finder, a Popular Hotspot Finder App, Exposed 2 Million Wi-Fi Network Passwords


๐Ÿ“ˆ 27.85 Punkte

๐Ÿ“Œ WiFi Finder, a Popular Hotspot Finder App, Exposed 2 Million Wi-Fi Network Passwords


๐Ÿ“ˆ 27.85 Punkte

๐Ÿ“Œ Okadminfinder3 - Admin Panel Finder / Admin Login Page Finder


๐Ÿ“ˆ 27.85 Punkte

๐Ÿ“Œ OKadminFinder - Admin Panel Finder / Admin Login Page Finder


๐Ÿ“ˆ 27.85 Punkte

๐Ÿ“Œ Path Finder 2151 - Powerful, award-winning Finder alternative.


๐Ÿ“ˆ 27.85 Punkte

๐Ÿ“Œ Customer Identity and Access Management 2.0: Bridging the Gap of Identity


๐Ÿ“ˆ 26.71 Punkte

๐Ÿ“Œ Identity Access Management vs. Identity Governance and Administration


๐Ÿ“ˆ 26.71 Punkte

๐Ÿ“Œ Identity Management Day: And Still More Advice from our Identity Management Champions


๐Ÿ“ˆ 26.07 Punkte

๐Ÿ“Œ Identity Management Day: Last Advice from our Identity Management Champions


๐Ÿ“ˆ 25 Punkte

๐Ÿ“Œ Identity Management Day: The Biggest Identity Management Challenge Facing Organizations Today


๐Ÿ“ˆ 25 Punkte

๐Ÿ“Œ Identity Management Day: Another Round of Advice from our Identity Management Champions


๐Ÿ“ˆ 25 Punkte

๐Ÿ“Œ Identity Management Day: More Advice from Our Identity Management Champions


๐Ÿ“ˆ 25 Punkte

๐Ÿ“Œ Identity Management Day: Advice from Our Identity Management Champions


๐Ÿ“ˆ 25 Punkte

๐Ÿ“Œ Embed An Audio Visualizer On Your Linux Desktop Background Using GLava (PPA Installation And Configuration Guide link in comments)


๐Ÿ“ˆ 23.93 Punkte

๐Ÿ“Œ Dock Party 2.5.6 - Spotify and Apple Music visualizer IN your macOS Dock.


๐Ÿ“ˆ 23.93 Punkte

๐Ÿ“Œ Ammonite 1.24 - Tag visualizer and search utility.


๐Ÿ“ˆ 23.93 Punkte

๐Ÿ“Œ Meet Netron: A Visualizer for Neural Network, Deep Learning and Machine Learning Models


๐Ÿ“ˆ 23.93 Punkte

๐Ÿ“Œ Ping Identity and Deloitte Forge Alliance to Give Organizations Advanced Identity and Access Solutions


๐Ÿ“ˆ 23.59 Punkte

๐Ÿ“Œ SnapLogic adds API management and anomaly detection capabilities


๐Ÿ“ˆ 23.42 Punkte

๐Ÿ“Œ Uncover and Remediate the Unexplored Risks with Continuous Posture Anomaly Management!


๐Ÿ“ˆ 23.42 Punkte

๐Ÿ“Œ The Access Management Headache โ€“ IT Teams Across EMEA Prescribed Unified Access Management To Ease Access Pains


๐Ÿ“ˆ 22.87 Punkte

๐Ÿ“Œ Visualizer < 3.3.1 - Stored XSS


๐Ÿ“ˆ 22.86 Punkte

๐Ÿ“Œ Visualizer < 3.3.1 - Blind SSRF


๐Ÿ“ˆ 22.86 Punkte

๐Ÿ“Œ Binary file entropy visualizer written in Python


๐Ÿ“ˆ 22.86 Punkte

๐Ÿ“Œ CLI based stock tracker / graph visualizer written in Go


๐Ÿ“ˆ 22.86 Punkte

๐Ÿ“Œ Kibana up to 5.6.14/6.6.0 Timelion Visualizer cross site scripting


๐Ÿ“ˆ 22.86 Punkte

๐Ÿ“Œ CLI stock visualizer HTTP client (stonks.icu)


๐Ÿ“ˆ 22.86 Punkte

๐Ÿ“Œ Barva is an audio visualizer that pulses the background of your terminal.


๐Ÿ“ˆ 22.86 Punkte

๐Ÿ“Œ Kibana up to 6.8.1/7.2.0 Timelion Visualizer Server-Side Request Forgery


๐Ÿ“ˆ 22.86 Punkte











matomo