oriagmon
b37ebf0fee
Removed note & added parentheses to a return statement condition
2018-10-17 10:44:34 +03:00
oriagmon
568e96c2f4
merged with multi-threaded-bug
2018-10-16 17:18:36 +03:00
oriagmon
1b18825b5e
Merge branch 'solve-multi-threading-bug' into access-secrets-hunter
2018-10-16 17:16:42 +03:00
ori.agmon
1e4ead93f4
Created RunningAsPodEvent
...
Throw it from hosts.py when running form pod
I was able to subscribe to the RunningAsPodEvent thanks to a Rebased with the branch that fix the circular dependencies bug (moveAzureComponentToTypes branch)
2018-10-16 17:12:42 +03:00
ori.agmon
1f01076cf6
Created RunningAsPodEvent
...
Throw it from hosts.py when running form pod
I was able to subscribe to the RunningAsPodEvent thanks to a Rebased with the branch that fix the circular dependencies bug (moveAzureComponentToTypes branch)
2018-10-16 17:12:42 +03:00
ori.agmon
08f38c623f
Had to remove the Azure component form the hunting/aks since it made a circular dependency bug!
2018-10-16 17:12:36 +03:00
ori.agmon
1f9b611237
Fixed all PR comments, just have to change the subscription now..
2018-10-16 17:12:24 +03:00
ori.agmon
eb5a0a6df2
Removed try & except & added logging
2018-10-16 17:12:24 +03:00
ori.agmon
8a8f2272ec
changed subscription
2018-10-16 17:12:24 +03:00
ori.agmon
efd2563e2a
Improved description for this hunter
2018-10-16 17:12:24 +03:00
ori.agmon
d3658f2d3d
removed the traceback after tested successfully
2018-10-16 17:12:24 +03:00
ori.agmon
5de247b0f5
changed the way im checking how many secrets there are at the default secrets path
2018-10-16 17:12:24 +03:00
ori.agmon
c7b1874dbb
changed the way im checking how many secrets there are at the default secrets path
2018-10-16 17:12:24 +03:00
ori.agmon
e66f427f92
access to secrets from within the pod hunter
2018-10-16 17:12:12 +03:00
oriagmon
086a403559
locked variables
2018-10-16 17:03:57 +03:00
oriagmon
229347e9fa
Attempting to solve the threading bug, I will do more checking to be sure its gone
2018-10-16 16:53:07 +03:00
ori.agmon
493d7d6d38
Created RunningAsPodEvent
...
Throw it from hosts.py when running form pod
I was able to subscribe to the RunningAsPodEvent thanks to a Rebased with the branch that fix the circular dependencies bug (moveAzureComponentToTypes branch)
2018-10-14 15:24:11 +03:00
ori.agmon
4b466f61c3
Created RunningAsPodEvent
...
Throw it from hosts.py when running form pod
I was able to subscribe to the RunningAsPodEvent thanks to a Rebased with the branch that fix the circular dependencies bug (moveAzureComponentToTypes branch)
2018-10-14 15:10:14 +03:00
ori.agmon
bff5ce7558
Had to remove the Azure component form the hunting/aks since it made a circular dependency bug!
2018-10-14 15:10:14 +03:00
ori.agmon
0c6de23c65
Fixed all PR comments, just have to change the subscription now..
2018-10-14 12:00:13 +03:00
ori.agmon
d401ede636
Removed try & except & added logging
2018-10-14 11:50:11 +03:00
ori.agmon
29a004239b
changed subscription
2018-10-10 18:04:08 +03:00
ori.agmon
c01de32f04
Improved description for this hunter
2018-10-10 11:29:44 +03:00
ori.agmon
bb01d1bad9
removed the traceback after tested successfully
2018-10-10 11:23:49 +03:00
ori.agmon
5efe381451
changed the way im checking how many secrets there are at the default secrets path
2018-10-09 22:21:24 +03:00
ori.agmon
18cbe6c53e
changed the way im checking how many secrets there are at the default secrets path
2018-10-09 22:15:28 +03:00
ori.agmon
105bc393da
access to secrets from within the pod hunter
2018-10-09 21:51:49 +03:00
ori.agmon
30435f2348
Fixed some english mistakes & :-)
2018-10-08 15:45:23 +03:00
ori.agmon
042e57e39f
Made some Distinctions between passive hunter and discovery (some discoveries were logged as passive hunters )
2018-10-07 10:43:24 +03:00
ori.agmon
e1712a7a74
Some passive hunters were logged as active hunters. I've fixed it
2018-10-03 18:58:10 +03:00
ori.agmon
48f0b8d829
Added more logging to most of the hunters.
...
Hosts.py, hunting/proxy.py, hunting/kubelet.py logging isn't finished yet.
2018-10-02 11:49:16 +03:00
ori.agmon
12c416e643
Added more logging to most of the hunters.
2018-09-30 14:39:37 +03:00
Liz Rice
15512ba8b8
401 status says pod was protected
2018-08-23 09:42:31 +01:00
cclauss
effcbc15c9
print() is a function in Python 3
...
Just like #15 and #19 but in a new file this time. Perhaps it is time to add some automated testing like Travis CI, Circle CI, Appveyor, etc. https://github.com/marketplace/category/continuous-integration
2018-08-21 09:53:24 +02:00
Cosmin Cojocar
74943f10d1
Refactor the reporter and add an YAML report format
...
Separate the events collection from report rendering, in order
to allow different type of reports.
2018-08-20 10:03:26 +02:00
Liz Rice
e9de79b330
Merge pull request #19 from cclauss/patch-1
...
print() is a function in Python 3
2018-08-20 08:39:39 +01:00
Lee Briggs
4e72112339
Add kubeadm API port to API Server discovery
2018-08-17 08:17:23 -07:00
Liz Rice
94822d1178
Look on port 6443 as well
2018-08-17 15:42:28 +01:00
cclauss
305e724894
print() is a function in Python 3
2018-08-17 15:29:18 +02:00
daniel_sagi
a4dbaaf446
added an API Server event, also added port 443 to ports discovery
2018-08-15 16:46:21 +03:00
daniel_sagi
615f3d3ace
Merge branch 'master' of https://github.com/aquasecurity/kube-hunter
2018-08-14 20:10:19 +03:00
daniel_sagi
7017146b5a
added TablesPrinted event publishing in default report module
2018-08-14 20:10:03 +03:00
danielsagi
25b226e849
Merge pull request #8 from aquasecurity/list-tests-option
...
Added List tests
2018-08-08 17:21:15 +03:00
daniel_sagi
31f077059c
added description for dashboard hunting
2018-08-08 17:07:28 +03:00
daniel_sagi
71c14fbdf8
added list option, as well as added description for all hunters
2018-08-08 15:57:43 +03:00
danielsagi
fcf983ece5
Updated services description
...
On kubelet services to be more neutral
2018-08-06 14:17:10 +03:00
daniel_sagi
eff8b9a598
minor change to table display, more information.
2018-07-24 19:03:48 +03:00
daniel_sagi
83d571b078
added status codes Unathorized and Forbidden handling of kubelet reponses
2018-07-24 18:51:38 +03:00
daniel_sagi
4e56e44156
added plugins package. for adding command lines arguments. moved report to the modules folder.
2018-07-24 16:30:28 +03:00
daniel_sagi
4e988dca38
moved all start status logging to the default module
2018-07-23 17:39:24 +03:00