Abusing Docker API | Socket

| | devoops, DEVOPS, Docker, Hacking, pentesting
Notes on abusing open Docker socketsThis wont cover breaking out of docker containersPorts: usually 2375 & 2376 but can be anythingRefs:https://blog.sourcerer.io/a-crash-course-on-docker-learn-to-swim-with-the-big-fish-6ff25e8958b0https://www.slideshare.net/BorgHan/hacking-docker-the-easy-wayhttps://blog.secureideas.com/2018/05/escaping-the-whale-things-you-probably-shouldnt-do-with-docker-part-1.htmlhttps://blog.secureideas.com/2018/08/escaping-the-whale-things-you-probably-shouldnt-do-with-docker-part-2.htmlhttps://infoslack.com/devops/exploring-docker-remote-apihttps://www.blackhat.com/docs/us-17/thursday/us-17-Cherny-Well-That-Escalated-Quickly-How-Abusing-The-Docker-API-Led-To-Remote-Code-Execution-Same-Origin-Bypass-And-Persistence_wp.pdfhttps://raesene.github.io/blog/2016/03/06/The-Dangers-Of-Docker.sock/https://cert.litnet.lt/2016/11/owning-system-through-an-exposed-docker-engine/https://medium.com/@riccardo.ancarani94/attacking-docker-exposed-api-3e01ffc3c124https://www.exploit-db.com/exploits/42356https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/http/docker_daemon_tcp.rbhttp://blog.nibblesec.org/2014/09/abusing-dockers-remote-apis.htmlhttps://www.prodefence.org/knock-knock-docker-will-you-let-me-in-open-api-abuse-in-docker-containers/https://blog.ropnop.com/plundering-docker-images/Enable docker socket (Create practice locations)https://success.docker.com/article/how-do-i-enable-the-remote-api-for-dockerdHaving the docker API | socket exposed ...
Kubernetes: unauth kublet API 10250 basic code exec

Kubernetes: unauth kublet API 10250 basic code exec

| | Cloud, devoops, Hacking, Kubernetes, pentesting
Unauth API access (10250)Most Kubernetes deployments provide authentication for this port. But it’s still possible to expose it inadvertently and it's still pretty common to find it exposed via the "insecure API ...
Kubernetes: unauth kublet API 10250 token theft & kubectl

Kubernetes: unauth kublet API 10250 token theft & kubectl

| | Cloud, devoops, Hacking, Kubernetes, pentesting
Kubernetes: unauthenticated kublet API (10250) token theft & kubectl access & execkube-hunter output to get us started: do a curl -s https://k8-node:10250/runningpods/ to get a list of running podsWith that data, you ...
Kubernetes: Kube-Hunter 10255

Kubernetes: Kube-Hunter 10255

| | Cloud, devoops, Hacking, Kubernetes, pentesting
Below is some sample output that mainly is here to see what open 10255 will give you and look like. What probably of most interest is the /pods endpointor the /metrics endpointor ...
Kubernetes: Kubelet API containerLogs endpoint

Kubernetes: Kubelet API containerLogs endpoint

| | Cloud, devoops, Hacking, Kubernetes, pentesting
How to get the info that kube-hunter reports for open /containerLogs endpointVulnerabilities+---------------+-------------+------------------+----------------------+----------------+| LOCATION CATEGORY | VULNERABILITY | DESCRIPTION | EVIDENCE |+---------------+-------------+------------------+----------------------+----------------++----------------+------------+------------------+----------------------+----------------+| 1.2.3.4:10250 | Information | Exposed Container| Output logs from a | ...
Hacking and Hardening Kubernetes Clusters by Example [I] - Brad Geesaman, Symantec

Kubernetes: Master Post

| | Cloud, devoops, Hacking, Kubernetes, pentesting
I have a few Kubernetes posts queued up and will make this the master post to index and give references for the topic. If i'm missing blog posts or useful resources ping ...
Kubernetes: open etcd

Kubernetes: open etcd

| | Cloud, devoops, Hacking, Kubernetes, pentesting
Quick post on Kubernetes and open etcd (port 2379)"etcd is a distributed key-value store. In fact, etcd is the primary datastore of Kubernetes; storing and replicating all Kubernetes cluster state. As a ...

Kubernetes: kube-hunter.py etcd

| | Cloud, devoops, Hacking, Kubernetes, pentesting
I mentioned in the master post one a few auditing tools that exist. Kube-Hunter is one that is pretty ok. You can use this to quickly scan for multiple kubernetes issues.Example run:$ ...
I found a GCP service account token...now what?

I found a GCP service account token…now what?

| | Cloud, devoops, gcp, Hacking, pentesting
Google Cloud Platform (GCP) is rapidly growing in popularity and i haven't seen too many posts on f**king it up so I'm going to do at least one :-)Google has several ways ...