ori.agmon
8a8f2272ec
changed subscription
2018-10-16 17:12:24 +03:00
ori.agmon
efd2563e2a
Improved description for this hunter
2018-10-16 17:12:24 +03:00
ori.agmon
d3658f2d3d
removed the traceback after tested successfully
2018-10-16 17:12:24 +03:00
ori.agmon
5de247b0f5
changed the way im checking how many secrets there are at the default secrets path
2018-10-16 17:12:24 +03:00
ori.agmon
c7b1874dbb
changed the way im checking how many secrets there are at the default secrets path
2018-10-16 17:12:24 +03:00
ori.agmon
e66f427f92
access to secrets from within the pod hunter
2018-10-16 17:12:12 +03:00
ori.agmon
493d7d6d38
Created RunningAsPodEvent
...
Throw it from hosts.py when running form pod
I was able to subscribe to the RunningAsPodEvent thanks to a Rebased with the branch that fix the circular dependencies bug (moveAzureComponentToTypes branch)
2018-10-14 15:24:11 +03:00
ori.agmon
4b466f61c3
Created RunningAsPodEvent
...
Throw it from hosts.py when running form pod
I was able to subscribe to the RunningAsPodEvent thanks to a Rebased with the branch that fix the circular dependencies bug (moveAzureComponentToTypes branch)
2018-10-14 15:10:14 +03:00
ori.agmon
bff5ce7558
Had to remove the Azure component form the hunting/aks since it made a circular dependency bug!
2018-10-14 15:10:14 +03:00
ori.agmon
0c6de23c65
Fixed all PR comments, just have to change the subscription now..
2018-10-14 12:00:13 +03:00
ori.agmon
d401ede636
Removed try & except & added logging
2018-10-14 11:50:11 +03:00
ori.agmon
29a004239b
changed subscription
2018-10-10 18:04:08 +03:00
ori.agmon
c01de32f04
Improved description for this hunter
2018-10-10 11:29:44 +03:00
ori.agmon
bb01d1bad9
removed the traceback after tested successfully
2018-10-10 11:23:49 +03:00
ori.agmon
5efe381451
changed the way im checking how many secrets there are at the default secrets path
2018-10-09 22:21:24 +03:00
ori.agmon
18cbe6c53e
changed the way im checking how many secrets there are at the default secrets path
2018-10-09 22:15:28 +03:00
ori.agmon
105bc393da
access to secrets from within the pod hunter
2018-10-09 21:51:49 +03:00
Liz Rice
15512ba8b8
401 status says pod was protected
2018-08-23 09:42:31 +01:00
cclauss
effcbc15c9
print() is a function in Python 3
...
Just like #15 and #19 but in a new file this time. Perhaps it is time to add some automated testing like Travis CI, Circle CI, Appveyor, etc. https://github.com/marketplace/category/continuous-integration
2018-08-21 09:53:24 +02:00
Cosmin Cojocar
74943f10d1
Refactor the reporter and add an YAML report format
...
Separate the events collection from report rendering, in order
to allow different type of reports.
2018-08-20 10:03:26 +02:00
Liz Rice
e9de79b330
Merge pull request #19 from cclauss/patch-1
...
print() is a function in Python 3
2018-08-20 08:39:39 +01:00
Lee Briggs
4e72112339
Add kubeadm API port to API Server discovery
2018-08-17 08:17:23 -07:00
Liz Rice
94822d1178
Look on port 6443 as well
2018-08-17 15:42:28 +01:00
cclauss
305e724894
print() is a function in Python 3
2018-08-17 15:29:18 +02:00
daniel_sagi
a4dbaaf446
added an API Server event, also added port 443 to ports discovery
2018-08-15 16:46:21 +03:00
daniel_sagi
615f3d3ace
Merge branch 'master' of https://github.com/aquasecurity/kube-hunter
2018-08-14 20:10:19 +03:00
daniel_sagi
7017146b5a
added TablesPrinted event publishing in default report module
2018-08-14 20:10:03 +03:00
danielsagi
25b226e849
Merge pull request #8 from aquasecurity/list-tests-option
...
Added List tests
2018-08-08 17:21:15 +03:00
daniel_sagi
31f077059c
added description for dashboard hunting
2018-08-08 17:07:28 +03:00
daniel_sagi
71c14fbdf8
added list option, as well as added description for all hunters
2018-08-08 15:57:43 +03:00
danielsagi
fcf983ece5
Updated services description
...
On kubelet services to be more neutral
2018-08-06 14:17:10 +03:00
daniel_sagi
eff8b9a598
minor change to table display, more information.
2018-07-24 19:03:48 +03:00
daniel_sagi
83d571b078
added status codes Unathorized and Forbidden handling of kubelet reponses
2018-07-24 18:51:38 +03:00
daniel_sagi
4e56e44156
added plugins package. for adding command lines arguments. moved report to the modules folder.
2018-07-24 16:30:28 +03:00
daniel_sagi
4e988dca38
moved all start status logging to the default module
2018-07-23 17:39:24 +03:00
daniel_sagi
174d93804c
added minimal dashboard hunting
2018-07-19 14:42:50 +03:00
daniel_sagi
be8895423e
minor changes in certificate hunting to match design pattern
2018-07-18 11:55:57 +03:00
daniel_sagi
0668079b30
Merge branch 'master' of bitbucket.org:scalock/kube-hunter
2018-07-18 11:37:53 +03:00
daniel_sagi
3d1c659233
fixed bug in discovery of secured kubelet api
2018-07-18 11:28:37 +03:00
daniel_sagi
da21dfa167
added passive evidences on some vulnerabilities
2018-07-18 11:28:05 +03:00
Shir
7c772e0f3b
Nice ascii view instead of the not-that-pretty table
2018-07-17 20:54:57 +03:00
daniel_sagi
185f89d07f
fixed pods vuln
2018-07-17 19:06:03 +03:00
daniel_sagi
67d05bccf5
removed commands on passive
2018-07-17 17:05:50 +03:00
daniel_sagi
4d599cda50
added classification for certificate hunting
2018-07-15 14:17:44 +03:00
daniel_sagi
5cb8889d16
Merge remote-tracking branch 'origin/liz'
2018-07-15 13:23:08 +03:00
daniel_sagi
0619eb06e2
changed existing vulnerabilities to specify categories, and changed a bit of their description
2018-07-15 13:17:42 +03:00
daniel_sagi
d0a7163221
advanced discovery of proxy
2018-07-15 13:15:59 +03:00
Liz Rice
b0b8ba9a5e
Description tweaks
2018-07-13 13:22:55 -04:00
Liz Rice
5e3ffcc7af
Hunt for email addresses in certificates
2018-07-13 13:22:01 -04:00
Liz Rice
6c103847a2
Error handling so that we can run locally without needing a network connection
...
Allows user to test with a kubernetes cluster on a local VM on their laptop, for example when on a plane :-)
2018-07-13 10:44:05 -04:00