ori.agmon
369e70ad6e
Fixed the PR comments :-)
2018-11-07 22:32:17 +02:00
ori.agmon
72dfbdc34d
Fixed the PR comments :-)
2018-11-07 22:32:17 +02:00
ori.agmon
a67e6a57c3
Added evidence to the no auth event & tested it on a vulnerable remote cluster (and it worked!)
2018-11-07 22:32:17 +02:00
ori.agmon
40213db654
I've Split the etcd hunters to hunting & discovery dirs
2018-11-07 22:32:17 +02:00
ori.agmon
0a4c80cb09
Solved some exception bugs & did some refactoring to code & Added event & splited active & passive hunter
2018-11-07 22:32:17 +02:00
ori.agmon
e764d5f21b
Solved some exception bugs & did some refactoring to code & Added event
2018-11-07 22:32:17 +02:00
ori.agmon
09c076c6a5
Solved some exception bugs & did some refactoring to code
2018-11-07 22:32:17 +02:00
ori.agmon
10e9a63e50
Added timeout for each request.
...
Finished with some of the TODOS tasks (added logs).
Added another TODO task for this branch.
2018-11-07 22:32:17 +02:00
ori.agmon
bca2f3614c
Edited some of the etcd checking & added 2379 port checking
2018-11-07 22:32:17 +02:00
ori.agmon
242260b03e
Added some remote access to etcd checks.
2018-11-07 22:32:17 +02:00
oriagmon
568e96c2f4
merged with multi-threaded-bug
2018-10-16 17:18:36 +03:00
oriagmon
1b18825b5e
Merge branch 'solve-multi-threading-bug' into access-secrets-hunter
2018-10-16 17:16:42 +03:00
ori.agmon
1f01076cf6
Created RunningAsPodEvent
...
Throw it from hosts.py when running form pod
I was able to subscribe to the RunningAsPodEvent thanks to a Rebased with the branch that fix the circular dependencies bug (moveAzureComponentToTypes branch)
2018-10-16 17:12:42 +03:00
ori.agmon
08f38c623f
Had to remove the Azure component form the hunting/aks since it made a circular dependency bug!
2018-10-16 17:12:36 +03:00
ori.agmon
4b466f61c3
Created RunningAsPodEvent
...
Throw it from hosts.py when running form pod
I was able to subscribe to the RunningAsPodEvent thanks to a Rebased with the branch that fix the circular dependencies bug (moveAzureComponentToTypes branch)
2018-10-14 15:10:14 +03:00
ori.agmon
bff5ce7558
Had to remove the Azure component form the hunting/aks since it made a circular dependency bug!
2018-10-14 15:10:14 +03:00
ori.agmon
30435f2348
Fixed some english mistakes & :-)
2018-10-08 15:45:23 +03:00
ori.agmon
042e57e39f
Made some Distinctions between passive hunter and discovery (some discoveries were logged as passive hunters )
2018-10-07 10:43:24 +03:00
ori.agmon
48f0b8d829
Added more logging to most of the hunters.
...
Hosts.py, hunting/proxy.py, hunting/kubelet.py logging isn't finished yet.
2018-10-02 11:49:16 +03:00
ori.agmon
12c416e643
Added more logging to most of the hunters.
2018-09-30 14:39:37 +03:00
Lee Briggs
4e72112339
Add kubeadm API port to API Server discovery
2018-08-17 08:17:23 -07:00
Liz Rice
94822d1178
Look on port 6443 as well
2018-08-17 15:42:28 +01:00
daniel_sagi
a4dbaaf446
added an API Server event, also added port 443 to ports discovery
2018-08-15 16:46:21 +03:00
danielsagi
25b226e849
Merge pull request #8 from aquasecurity/list-tests-option
...
Added List tests
2018-08-08 17:21:15 +03:00
daniel_sagi
71c14fbdf8
added list option, as well as added description for all hunters
2018-08-08 15:57:43 +03:00
danielsagi
fcf983ece5
Updated services description
...
On kubelet services to be more neutral
2018-08-06 14:17:10 +03:00
daniel_sagi
83d571b078
added status codes Unathorized and Forbidden handling of kubelet reponses
2018-07-24 18:51:38 +03:00
daniel_sagi
4e988dca38
moved all start status logging to the default module
2018-07-23 17:39:24 +03:00
daniel_sagi
174d93804c
added minimal dashboard hunting
2018-07-19 14:42:50 +03:00
daniel_sagi
0668079b30
Merge branch 'master' of bitbucket.org:scalock/kube-hunter
2018-07-18 11:37:53 +03:00
daniel_sagi
3d1c659233
fixed bug in discovery of secured kubelet api
2018-07-18 11:28:37 +03:00
Shir
7c772e0f3b
Nice ascii view instead of the not-that-pretty table
2018-07-17 20:54:57 +03:00
daniel_sagi
5cb8889d16
Merge remote-tracking branch 'origin/liz'
2018-07-15 13:23:08 +03:00
daniel_sagi
0619eb06e2
changed existing vulnerabilities to specify categories, and changed a bit of their description
2018-07-15 13:17:42 +03:00
daniel_sagi
d0a7163221
advanced discovery of proxy
2018-07-15 13:15:59 +03:00
Liz Rice
b0b8ba9a5e
Description tweaks
2018-07-13 13:22:55 -04:00
Liz Rice
6c103847a2
Error handling so that we can run locally without needing a network connection
...
Allows user to test with a kubernetes cluster on a local VM on their laptop, for example when on a plane :-)
2018-07-13 10:44:05 -04:00
Liz Rice
e3b21d1d64
Don't stack trace if we can't access the internet
2018-07-13 10:10:29 -04:00
daniel_sagi
e16bc40fb7
minor services description improvements
2018-07-04 15:08:51 +03:00
daniel_sagi
23c03afc02
added interactive choosing of scanning options
2018-07-02 16:20:14 +03:00
daniel_sagi
464e7aad1f
Added exception handling and improved help
2018-06-21 13:45:19 +03:00
daniel_sagi
8c6712f378
1. Changed report methods and renamed "log" module to "", added another report generation in a new json format
...
2. started to add the --token option to send the finished report.
3. changed a bit of kubelet vulnerability output architecture to match out conventions.
4. added healthz check on kubelets
2018-06-20 12:09:40 +03:00
daniel_sagi
2b690056b0
Fixed type in privileged, also moved Components to core.types
2018-06-19 11:07:18 +03:00
daniel_sagi
fac667552e
added cidr option, also added a while true when running on a pod, to halt for seeing results before restart
2018-06-17 19:01:23 +03:00
daniel_sagi
f3b9b5200f
added requirements.txt
2018-06-12 16:55:22 +03:00
daniel_sagi
73a4e83781
Added checks on api responses before json.loads, added a quick scanning option, to scan part of the subnet
2018-06-12 14:30:28 +03:00
daniel_sagi
3f174364f7
Added cloud identifiering for each type of host scan, using azurespeed. Now AzuerSpn hunting will be triggered only if the host is an azure cluster. using predicate, and the new 'cloud' attribute
2018-06-12 12:10:59 +03:00
daniel_sagi
973c2a25a0
changed output results table format, added AzureMetadata vulnerability on discovery
2018-06-11 20:02:25 +03:00
daniel_sagi
75393da91a
simplified kubelet open handlers hunting and types
2018-06-11 14:26:09 +03:00
daniel_sagi
01c4aac105
Active hunting is now available by inheriting from ActiveHunter. the hunter wil subscribe only if the --active flag was set.
...
1. Removed scanning configuration from events, from now on, scanning config is accessed from the main module
2. Moved core types to a "toplevel" file
2018-06-11 12:39:11 +03:00