sethsec

@sethsec@infosec.exchange
203 Followers
104 Following
63 Posts
Senior Security Advocate @ Datadog. Former Principal and Cloud Penetration Testing lead @BishopFox. I like to build, break, learn, and share. 
CloudFox, Cloudfoxable, BadPods, IAM Vulnerable
CloudFoxhttps://github.com/BishopFox/cloudfox
IAM Vulnerablehttps://github.com/BishopFox/iam-vulnerable
Bad Podshttps://github.com/BishopFox/badpods
LinkedInhttps://www.linkedin.com/in/sethart/
Bloggerhttps://sethsec.blogspot.com/

Need to get code execution on thousands of cloud customers? What about on internal AWS systems? Datadog Security Research found that a number of tools, including one published by AWS, are susceptible to name confusion attacks, leading to arbitrary execution in vulnerable environments!

https://securitylabs.datadoghq.com/articles/whoami-a-cloud-image-name-confusion-attack/

whoAMI: A cloud image name confusion attack | Datadog Security Labs

Detailing the discovery and impact of the whoAMI cloud image name confusion attack, which could allow attackers to execute code within AWS accounts due to a vulnerable pattern in AMI retrieval.

An interesting post on Datadog's security lab about an attacker which tries to use #Kubernetes and #Docker APIs to move.

what caught my eye is that the attacker is trying to use the Kubelet API, which might be an attempt to evade Kubernetes audit logging as that doesn't apply there...

https://securitylabs.datadoghq.com/articles/threat-actors-leveraging-docker-swarm-kubernetes-mine-cryptocurrency/

Threat Actors leverage Docker Swarm and Kubernetes to mine cryptocurrency at scale | Datadog Security Labs

Analyzing a campaign where a threat actor leveraged Docker Swam and Kubernetes to mine cryptocurrency

CloudFox v.1.13.0 is out with 2 new AWS commands and a bunch of updates.

* The new workloads command looks at EC2, Lambda, and ECS and highlights any workload that has an admin role attached, as well as any role that can privesc to admin!

* The new api-gws command contributed by Wyatt Dahlenburg finds all API gw endpoints and crafts custom curl commands for you with any API keys found in the endpoint metadata)

* The env-vars command has been upgraded to help you find secrets stored in environment variables. It highlights interesting variable names and creates a separate output file with just the interesting items.

* The role-trusts command has been upgraded to help you find overly permissive role trusts, particularly those that trust :root, without an ExternalID.

https://github.com/BishopFox/cloudfox

#cloudfox #cloudsecurity

GitHub - BishopFox/cloudfox: Automating situational awareness for cloud penetration tests.

Automating situational awareness for cloud penetration tests. - BishopFox/cloudfox

GitHub

“Recently, one of our pen testers found a bastion host during an #Azure assumed-breach #pentest. We were given the credentials of an employee within Azure Active Directory. The pen tester was able to log into SSH with Azure #ActiveDirectory credentials. So, he got onto the bastion host, which was a #Linux box. One of the users on that box made their home directory world readable for everyone. He rifled through that user’s directory and found credentials for Snowflake, a third-party database service. He used those credentials to connect to the 3rd-party provider and gained access to production #data.” - @sethsec on a recent episode of the Cloud Security Podcast.

https://bfx.social/3sr7t2i

Cloud Security Podcast Featuring Seth Art: Network Pentest 2.0

Learn about cloud security and cloud penetration testing in Seth Art's, principal security consultant at Bishop Fox, interview with Cloud Security Podcast.

Bishop Fox

Last week, we highlighted a recent @cloudsecpod episode featuring @sethsec. This week, we’re focusing on another episode where Seth walks through the distinctions of #network #pentesting.

Check out the recap at our blog. https://bfx.social/3sr7t2i

Cloud Security Podcast Featuring Seth Art: Network Pentest 2.0

Learn about cloud security and cloud penetration testing in Seth Art's, principal security consultant at Bishop Fox, interview with Cloud Security Podcast.

Bishop Fox

Get a crash course into the world of #AWS cloud security in this interview with @sethsec and @hashishrajan of @cloudsecpod.

Expect insights into the differences between #cloud penetration testing and other forms of #penetrationtesting, how to ensure AWS cloud #pentesting is effective, and more.

https://bfx.social/49iQ6RZ

Cloud Security Podcast Featuring Seth Art: Cloud Pentest of AWS

Hear insights from Seth Art on how AWS cloud penetration testing improves cloud security and why cloud configuration reviews are not always enough.

Bishop Fox
When creating the vulnerable #AWS environment CloudFoxable, @sethsec drew inspiration from other #security tools like #CloudGoat, flaws.cloud, and #Metasploitable CloudFoxable provides flags and attack paths in a #CTF format. Check out how the challenges work in the write-up! https://bfx.social/462AtfN
CloudFoxable

Have you added CloudFoxable to your playground #AWS account? This tool by @sethsec is built to help #pentesters with AWS #Cloud testing, while showcasing CloudFox’s capabilities that help locate latent #attackpaths. It is inspired by #CloudGoat, flaws.cloud, and #Metasploitable. https://bfx.social/43T4dtK
Introducing CloudFoxable: A Gamified Cloud Hacking Sandbox

Introducing CloudFoxable, an intentionally vulnerable AWS environment to learn AWS cloud pen testing with CloudFox to help you find latent attack paths.

Bishop Fox

You already know #CloudFox, now meet CloudFoxable created by Bishop Fox Cloud Security Practice Lead @sethsec! This tool is an intentionally vulnerable #AWS environment created to teach the art of AWS #Cloud #pentesting while showcasing CloudFox’s capabilities that can help you locate latent attack paths more effectively. Give it a go and let us know what you think!

https://bfx.social/43T4dtK

Introducing CloudFoxable: A Gamified Cloud Hacking Sandbox

Introducing CloudFoxable, an intentionally vulnerable AWS environment to learn AWS cloud pen testing with CloudFox to help you find latent attack paths.

Bishop Fox

CloudFox v1.11.0 Released

📣AWS

New Commands:
- 🦊 resource-trusts
- 🦊 org
- 🦊 codebuild
- 🦊 databases

Updates:
- Default output location changed to ~/.cloudfox/
- Bug fixes for permissions command
- Added function caching to speed things up

https://github.com/BishopFox/cloudfox/releases/tag/v1.11.0

Release v1.11.0 · BishopFox/cloudfox

AWS New Commands resource-trusts - Looks at CodeBuild, ECR, EFS, Lambda, S3, SNS, SQS for any resource policies that might be interesting for a penetration tester org - Checks if an account is in...

GitHub