<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: vasant</title>
    <description>The latest articles on DEV Community by vasant (@cloudsecguy).</description>
    <link>https://dev.to/cloudsecguy</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F435998%2F34272b0b-e942-47fd-8797-a34620db9793.jpg</url>
      <title>DEV Community: vasant</title>
      <link>https://dev.to/cloudsecguy</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/cloudsecguy"/>
    <language>en</language>
    <item>
      <title>Kubestriker - A Blazing fast Security Auditing tool for kubernetes!!</title>
      <dc:creator>vasant</dc:creator>
      <pubDate>Fri, 15 Jan 2021 03:56:09 +0000</pubDate>
      <link>https://dev.to/cloudsecguy/kubestriker-a-blazing-fast-security-auditing-tool-for-kubernetes-2igi</link>
      <guid>https://dev.to/cloudsecguy/kubestriker-a-blazing-fast-security-auditing-tool-for-kubernetes-2igi</guid>
      <description>&lt;h1&gt;
  &lt;br&gt;
  &lt;a href="https://github.com/vchinnipilli/kubestriker" rel="noopener noreferrer"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fraw.githubusercontent.com%2Fvchinnipilli%2Fkubestriker%2Fmaster%2Fmedia%2Fkube-striker.png"&gt;&lt;/a&gt;
&lt;/h1&gt;

&lt;h4&gt; A Blazing fast Security Auditing tool for &lt;a href="https://kubernetes.io/" rel="noopener noreferrer"&gt;kubernetes&lt;/a&gt;!!&lt;/h4&gt;

&lt;p&gt;Kubernetes is a big, complex, fast-moving platform that solves problems such as high availability, resiliency, and scaling by providing an extensible, declarative platform that automates the management of containers.&lt;/p&gt;

&lt;p&gt;Enterprise organisations across nearly all verticals, including those with strong security requirements, such as financial services, healthcare, government, and telecommunications, are deploying production applications to Kubernetes clusters.&lt;/p&gt;

&lt;p&gt;While this rapid adoption of Kubernetes shows just how disruptive these technologies have been, they have also led to new security problems.&lt;/p&gt;

&lt;p&gt;The security of the cluster, of course, cannot be achieved in a single process. There are many moving parts within the Kubernetes cluster that must be properly secured. But with so many moving parts, keeping your Kubernetes secure is no trivial task.&lt;/p&gt;

&lt;h3&gt;
  
  
  Basic Overview
&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;Kubestriker&lt;/strong&gt; performs numerous in depth checks on kubernetes infra to identify the  &lt;strong&gt;security misconfigurations&lt;/strong&gt; and challenges that devops engineers/developers are likely to encounter when using Kubernetes, especially in production and at scale.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;kubestriker&lt;/strong&gt; is Platform agnostic and works equally well across more than one platform such as self hosted &lt;a href="https://kubernetes.io/" rel="noopener noreferrer"&gt;kubernetes&lt;/a&gt;, &lt;a href="https://aws.amazon.com/eks" rel="noopener noreferrer"&gt;Amazon EKS&lt;/a&gt;, &lt;a href="https://azure.microsoft.com/en-us/services/kubernetes-service/" rel="noopener noreferrer"&gt;Azure AKS&lt;/a&gt;, &lt;a href="https://cloud.google.com/kubernetes-engine" rel="noopener noreferrer"&gt;Google GKE&lt;/a&gt; etc.&lt;/p&gt;

&lt;p&gt; &lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fraw.githubusercontent.com%2Fvchinnipilli%2Fkubestriker%2Fmaster%2Fmedia%2Fpip-install.gif" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fraw.githubusercontent.com%2Fvchinnipilli%2Fkubestriker%2Fmaster%2Fmedia%2Fpip-install.gif"&gt;&lt;/a&gt; &lt;/p&gt;

&lt;h3&gt;
  
  
  Table of content
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;
How To Install

&lt;ul&gt;
&lt;li&gt;Clone the repo and install&lt;/li&gt;
&lt;li&gt;Install using pip&lt;/li&gt;
&lt;li&gt;How to spin up kubestriker container&lt;/li&gt;
&lt;/ul&gt;


&lt;/li&gt;

&lt;li&gt;

Types of Scans

&lt;ul&gt;
&lt;li&gt;Authenticated scans&lt;/li&gt;
&lt;li&gt;Unauthenticated scans&lt;/li&gt;
&lt;li&gt;Identifying an open Insecure port on kubernetes master node&lt;/li&gt;
&lt;li&gt;Identifying a worker Node with kubelet readwrite and readonly ports open&lt;/li&gt;
&lt;/ul&gt;


&lt;/li&gt;

&lt;li&gt;Current Capabilities&lt;/li&gt;

&lt;li&gt;Future improvements&lt;/li&gt;

&lt;li&gt;Suggestions&lt;/li&gt;

&lt;li&gt;Contributors&lt;/li&gt;

&lt;li&gt;Statistics&lt;/li&gt;

&lt;li&gt;License&lt;/li&gt;

&lt;li&gt;Support&lt;/li&gt;

&lt;li&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fraw.githubusercontent.com%2Fvchinnipilli%2Fkubestriker%2Fmaster%2Fmedia%2Fwave.gif"&gt;&lt;/li&gt;

&lt;/ul&gt;

&lt;h2&gt;
  
  
  How To Install
&lt;/h2&gt;

&lt;h3&gt;
  
  
  Clone the repo and install
&lt;/h3&gt;

&lt;p&gt;To install this tool or clone and run this application, you'll need &lt;a href="https://git-scm.com" rel="noopener noreferrer"&gt;Git&lt;/a&gt;, &lt;a href="https://www.python.org/downloads/" rel="noopener noreferrer"&gt;python3&lt;/a&gt; and &lt;a href="https://pypi.org/project/pip/" rel="noopener noreferrer"&gt;pip&lt;/a&gt;  installed on your computer. It is advised you install this tool in &lt;a href="https://virtualenv.pypa.io/en/latest/installation.html" rel="noopener noreferrer"&gt;virtual environment&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;From your command line:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;
&lt;span class="c"&gt;# Create python virtual environment&lt;/span&gt;
&lt;span class="nv"&gt;$ &lt;/span&gt;python3 &lt;span class="nt"&gt;-m&lt;/span&gt; venv &lt;span class="nb"&gt;env&lt;/span&gt;

&lt;span class="c"&gt;# Activate python virtual environment&lt;/span&gt;
&lt;span class="nv"&gt;$ &lt;/span&gt;&lt;span class="nb"&gt;source env&lt;/span&gt;/bin/activate

&lt;span class="c"&gt;# Clone this repository&lt;/span&gt;
&lt;span class="nv"&gt;$ &lt;/span&gt;git clone https://github.com/vchinnipilli/kubestriker.git

&lt;span class="c"&gt;# Go into the repository&lt;/span&gt;
&lt;span class="nv"&gt;$ &lt;/span&gt;&lt;span class="nb"&gt;cd &lt;/span&gt;kubestriker

&lt;span class="c"&gt;# Install dependencies&lt;/span&gt;
&lt;span class="nv"&gt;$ &lt;/span&gt;pip &lt;span class="nb"&gt;install&lt;/span&gt; &lt;span class="nt"&gt;-r&lt;/span&gt; requirements.txt

&lt;span class="c"&gt;# Incase of prompt toolkit or selectmenu errors&lt;/span&gt;
&lt;span class="nv"&gt;$ &lt;/span&gt;pip &lt;span class="nb"&gt;install &lt;/span&gt;prompt-toolkit&lt;span class="o"&gt;==&lt;/span&gt;1.0.15 
&lt;span class="nv"&gt;$ &lt;/span&gt;pip &lt;span class="nb"&gt;install&lt;/span&gt; &lt;span class="nt"&gt;-r&lt;/span&gt; requirements.txt

&lt;span class="c"&gt;# Gearing up Kubestriker&lt;/span&gt;
&lt;span class="nv"&gt;$ &lt;/span&gt;python &lt;span class="nt"&gt;-m&lt;/span&gt; kubestriker

&lt;span class="c"&gt;# Result will be generated in the current working directory with the name of the target&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;h3&gt;
  
  
  Install using pip
&lt;/h3&gt;

&lt;p&gt;To install and run this application, you'll need &lt;a href="https://pypi.org/project/pip/" rel="noopener noreferrer"&gt;pip&lt;/a&gt; installed on your computer. From your command line:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;
&lt;span class="c"&gt;# Create python virtual environment&lt;/span&gt;
&lt;span class="nv"&gt;$ &lt;/span&gt;python3 &lt;span class="nt"&gt;-m&lt;/span&gt; venv &lt;span class="nb"&gt;env&lt;/span&gt;

&lt;span class="c"&gt;# Activate python virtual environment&lt;/span&gt;
&lt;span class="nv"&gt;$ &lt;/span&gt;&lt;span class="nb"&gt;source env&lt;/span&gt;/bin/activate

&lt;span class="c"&gt;# Install using pip&lt;/span&gt;
&lt;span class="nv"&gt;$ &lt;/span&gt;pip &lt;span class="nb"&gt;install &lt;/span&gt;kubestriker

&lt;span class="c"&gt;# Incase of prompt toolkit or selectmenu errors&lt;/span&gt;
&lt;span class="nv"&gt;$ &lt;/span&gt;pip &lt;span class="nb"&gt;install &lt;/span&gt;prompt-toolkit&lt;span class="o"&gt;==&lt;/span&gt;1.0.15 
&lt;span class="nv"&gt;$ &lt;/span&gt;pip &lt;span class="nb"&gt;install &lt;/span&gt;kubestriker

&lt;span class="c"&gt;# Gearing up Kubestriker&lt;/span&gt;
&lt;span class="nv"&gt;$ &lt;/span&gt;python &lt;span class="nt"&gt;-m&lt;/span&gt; kubestriker

&lt;span class="c"&gt;# Result will be generated in the current working directory with the name of the target&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;h3&gt;
  
  
  How to spin up kubestriker container
&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://hub.docker.com/repository/docker/cloudsecguy/kubestriker" rel="noopener noreferrer"&gt;Use this link to view the Kubestriker container latest releases&lt;/a&gt;&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;&lt;span class="c"&gt;# Spinning up the kubestriker Container&lt;/span&gt;
&lt;span class="nv"&gt;$ &lt;/span&gt;docker run &lt;span class="nt"&gt;-it&lt;/span&gt; &lt;span class="nt"&gt;--rm&lt;/span&gt; &lt;span class="nt"&gt;-v&lt;/span&gt; /Users/vasantchinnipilli/.kube/config:/root/.kube/config &lt;span class="nt"&gt;-v&lt;/span&gt; &lt;span class="s2"&gt;"&lt;/span&gt;&lt;span class="si"&gt;$(&lt;/span&gt;&lt;span class="nb"&gt;pwd&lt;/span&gt;&lt;span class="si"&gt;)&lt;/span&gt;&lt;span class="s2"&gt;"&lt;/span&gt;:/kubestriker &lt;span class="nt"&gt;--name&lt;/span&gt; kubestriker cloudsecguy/kubestriker:v1.0.0

&lt;span class="c"&gt;# Replace the user vasantchinnipilli above with your username or absolute path of kube config file&lt;/span&gt;
&lt;span class="nv"&gt;$ &lt;/span&gt;docker run &lt;span class="nt"&gt;-it&lt;/span&gt; &lt;span class="nt"&gt;--rm&lt;/span&gt; &lt;span class="nt"&gt;-v&lt;/span&gt; /Users/&amp;lt;yourusername&amp;gt;/.kube/config:/root/.kube/config &lt;span class="nt"&gt;-v&lt;/span&gt; &lt;span class="s2"&gt;"&lt;/span&gt;&lt;span class="si"&gt;$(&lt;/span&gt;&lt;span class="nb"&gt;pwd&lt;/span&gt;&lt;span class="si"&gt;)&lt;/span&gt;&lt;span class="s2"&gt;"&lt;/span&gt;:/kubestriker &lt;span class="nt"&gt;--name&lt;/span&gt; kubestriker cloudsecguy/kubestriker:v1.0.0

&lt;span class="c"&gt;# Gearing up Kubestriker&lt;/span&gt;
&lt;span class="nv"&gt;$ &lt;/span&gt;python &lt;span class="nt"&gt;-m&lt;/span&gt; kubestriker

&lt;span class="c"&gt;# Result will be generated in the current working directory with the name of the target&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt; &lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fraw.githubusercontent.com%2Fvchinnipilli%2Fkubestriker%2Fmaster%2Fmedia%2Fdocker.gif" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fraw.githubusercontent.com%2Fvchinnipilli%2Fkubestriker%2Fmaster%2Fmedia%2Fdocker.gif"&gt;&lt;/a&gt; &lt;/p&gt;

&lt;h2&gt;
  
  
  Types of Scans
&lt;/h2&gt;

&lt;h3&gt;
  
  
  Authenticated scans
&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;Authenticated scan&lt;/strong&gt; expects the user to have atleast &lt;strong&gt;read-only&lt;/strong&gt; privileges and provide a token during the scan. please use the below provided links to create read-only users&lt;/p&gt;

&lt;p&gt;&lt;a href="https://docs.aws.amazon.com/eks/latest/userguide/add-user-role.html" rel="noopener noreferrer"&gt;Create read-only user for Amazon eks&lt;/a&gt;\&lt;br&gt;
&lt;a href="https://docs.microsoft.com/en-us/azure/aks/control-kubeconfig-access" rel="noopener noreferrer"&gt;Create read-only user for Azure aks&lt;/a&gt;\&lt;br&gt;
&lt;a href="https://cloud.google.com/kubernetes-engine/docs/how-to/iam" rel="noopener noreferrer"&gt;Create read-only user for Google gke&lt;/a&gt;\&lt;br&gt;
&lt;a href="https://medium.com/@rschoening/read-only-access-to-kubernetes-cluster-fcf84670b698" rel="noopener noreferrer"&gt;Create a subject using Role based access control&lt;/a&gt;&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;&lt;span class="c"&gt;# To grab a token from eks cluster&lt;/span&gt;
&lt;span class="nv"&gt;$ &lt;/span&gt;aws eks get-token &lt;span class="nt"&gt;--cluster-name&lt;/span&gt; cluster-name &lt;span class="nt"&gt;--region&lt;/span&gt; ap-southeast-2

&lt;span class="c"&gt;# To grab a token from aks cluster&lt;/span&gt;
&lt;span class="nv"&gt;$ &lt;/span&gt;az aks get-credentials &lt;span class="nt"&gt;--resource-group&lt;/span&gt; myResourceGroup &lt;span class="nt"&gt;--name&lt;/span&gt; myAKSCluster

&lt;span class="c"&gt;# To grab a token from gke cluster&lt;/span&gt;
&lt;span class="nv"&gt;$ &lt;/span&gt;gcloud container clusters get-credentials CLUSTER_NAME &lt;span class="nt"&gt;--zone&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;COMPUTE_ZONE

&lt;span class="c"&gt;# To grab a token from service account&lt;/span&gt;
&lt;span class="nv"&gt;$ &lt;/span&gt;kubectl &lt;span class="nt"&gt;-n&lt;/span&gt; namespace get secret serviceaccount-token &lt;span class="nt"&gt;-o&lt;/span&gt; &lt;span class="nv"&gt;jsonpath&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;&lt;span class="s1"&gt;'{.data.token}'&lt;/span&gt;

&lt;span class="c"&gt;# To grab a token from a pod directly or via command execution bug&lt;/span&gt;
&lt;span class="nv"&gt;$ &lt;/span&gt;&lt;span class="nb"&gt;cat&lt;/span&gt; /run/secrets/kubernetes.io/serviceaccount/token
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;h3&gt;
  
  
  Unauthenticated scans
&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;Unauthenticated scan&lt;/strong&gt; will be successful incase of anonymous access is permitted on the target cluster&lt;/p&gt;

&lt;h4&gt;
  
  
  Identifying an open Insecure port on kubernetes master node
&lt;/h4&gt;

&lt;p&gt; &lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fraw.githubusercontent.com%2Fvchinnipilli%2Fkubestriker%2Fmaster%2Fmedia%2Finsecure_port.gif" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fraw.githubusercontent.com%2Fvchinnipilli%2Fkubestriker%2Fmaster%2Fmedia%2Finsecure_port.gif"&gt;&lt;/a&gt; &lt;/p&gt;

&lt;h4&gt;
  
  
  Identifying a worker Node with kubelet readwrite and readonly ports open
&lt;/h4&gt;

&lt;p&gt; &lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fraw.githubusercontent.com%2Fvchinnipilli%2Fkubestriker%2Fmaster%2Fmedia%2Fnode_scan.gif" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fraw.githubusercontent.com%2Fvchinnipilli%2Fkubestriker%2Fmaster%2Fmedia%2Fnode_scan.gif"&gt;&lt;/a&gt; &lt;/p&gt;

&lt;h2&gt;
  
  
  Current Capabilities
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Scans Self Managed and cloud provider managed kubernetes infra&lt;/li&gt;
&lt;li&gt;Reconnaissance phase checks for various services or open ports&lt;/li&gt;
&lt;li&gt;Performs automated scans incase of insecure, readwrite or readonly services are enabled&lt;/li&gt;
&lt;li&gt;Performs both authenticated scans and unauthenticated scans&lt;/li&gt;
&lt;li&gt;Scans for wide range of IAM Misconfigurations in the cluster&lt;/li&gt;
&lt;li&gt;Scans for wide range of Misconfigured containers&lt;/li&gt;
&lt;li&gt;Scans for wide range of Misconfigured Pod Security Policies&lt;/li&gt;
&lt;li&gt;Scans for wide range of Misconfigured Network policies&lt;/li&gt;
&lt;li&gt;Scans the privileges of a subject in the cluster&lt;/li&gt;
&lt;li&gt;Run commands on the containers and streams back the output&lt;/li&gt;
&lt;li&gt;Provides the endpoints of the misconfigured services&lt;/li&gt;
&lt;li&gt;Provides possible privilege escalation details&lt;/li&gt;
&lt;li&gt;Elaborative report with detailed explanation&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Future improvements
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Automated exploitation based on the issues identified&lt;/li&gt;
&lt;li&gt;api and cicd automation friendly&lt;/li&gt;
&lt;li&gt;A Decent FrontEnd to make the lives easier&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Suggestions
&lt;/h2&gt;

&lt;p&gt;Kubestriker is an opensource and &lt;a href="https://en.wiktionary.org/wiki/emailware" rel="noopener noreferrer"&gt;emailware&lt;/a&gt;. Meaning, if you liked using this tool or it has helped you in any way or if you have any suggestions/improvements, I'd like you send me an email at &lt;a href="mailto:vchinnipilli@gmail.com"&gt;vchinnipilli@gmail.com&lt;/a&gt; about anything you'd want to say about this tool. I'd really appreciate it!&lt;/p&gt;

&lt;h2&gt;
  
  
  Contributors
&lt;/h2&gt;

&lt;h2&gt;
  
  
  Statistics
&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://github.com/vchinnipilli/kubestriker" rel="noopener noreferrer"&gt;&lt;br&gt;
  &lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fgithub-readme-stats.vercel.app%2Fapi%3Fusername%3Dkubestriker%26orgs%3Dvchinnipilli%26show_icons%3Dtrue%26layout%3Dcompact"&gt;&lt;br&gt;
&lt;/a&gt;&lt;br&gt;
&lt;a href="https://github.com/vchinnipilli/kubestriker" rel="noopener noreferrer"&gt;&lt;br&gt;
  &lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fgithub-readme-stats.vercel.app%2Fapi%2Ftop-langs%2F%3Fusername%3Dkubestriker%26orgs%3Dvchinnipilli%26layout%3Dcompact"&gt;&lt;br&gt;
&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  License
&lt;/h2&gt;

&lt;p&gt;&lt;strong&gt;Apache License&lt;/strong&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  Support
&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://cloudsecguy.dev" rel="noopener noreferrer"&gt;vasant chinnipilli&lt;/a&gt; builds and maintains kubestriker to audit and secure kubernetes infrastructure. &lt;/p&gt;

&lt;p&gt;Start with &lt;a href="https://cloudsecguy.dev" rel="noopener noreferrer"&gt;Documentation - will be available soon&lt;/a&gt; for quick tutorials and examples.&lt;/p&gt;

&lt;p&gt;If you need direct support you can contact me at &lt;a href="mailto:vchinnipilli@gmail.com"&gt;vchinnipilli@gmail.com&lt;/a&gt;.&lt;/p&gt;

&lt;h2&gt;
  
  
  Find me here!!
&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://www.cloudsecguy.dev/" rel="noopener noreferrer"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fimg.shields.io%2Fbadge%2F-https%3A%2F%2Fwww.cloudsecguy.dev-brightgreen%3Fstyle%3Dplastic%26label%3Dweb%3A%26logoColor%3Dwhite%26link%3Dhttps%3A%2F%2Fwww.cloudsecguy.dev%2F" alt="cloudsecguy.dev"&gt;&lt;/a&gt;&lt;br&gt;
&lt;a href="https://www.linkedin.com/in/vasantreddy/" rel="noopener noreferrer"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fimg.shields.io%2Fbadge%2F-vasantChinnipilli-blue%3Fstyle%3Dplastic%26logo%3DLinkedin%26logoColor%3Dwhite%26link%3Dhttps%3A%2F%2Fwww.linkedin.com%2Fin%2Fvasantreddy%2F" alt="Linkedin Badge"&gt;&lt;/a&gt;&lt;br&gt;
&lt;a href="https://medium.com/@vasantkumarchinnipilli" rel="noopener noreferrer"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fimg.shields.io%2Fbadge%2F-%40vasantchinnipilli-03a57a%3Fstyle%3Dplastic%26labelColor%3D000000%26logo%3DMedium%26link%3Dhttps%3A%2F%2Fmedium.com%2F%40vasantkumarchinnipilli%2F" alt="Medium Badge"&gt;&lt;/a&gt;&lt;/p&gt;

</description>
      <category>devops</category>
      <category>security</category>
      <category>programming</category>
      <category>kubernetes</category>
    </item>
    <item>
      <title>Docker for Devs and Security Professionals</title>
      <dc:creator>vasant</dc:creator>
      <pubDate>Wed, 12 Aug 2020 07:20:26 +0000</pubDate>
      <link>https://dev.to/cloudsecguy/docker-for-devs-and-security-professionals-1m72</link>
      <guid>https://dev.to/cloudsecguy/docker-for-devs-and-security-professionals-1m72</guid>
      <description>&lt;p&gt;Docker, and the containers it makes possible, has revolutionized the software industry and in a few years, their popularity as a tool and platform has skyrocketed and Docker containers have become a massively popular technology. &lt;/p&gt;


&lt;div class="ltag__link"&gt;
  &lt;a href="https://medium.com/@vasantkumarchinnipilli/docker-for-devs-and-security-professionals-67fd14a75078" class="ltag__link__link"&gt;
    &lt;div class="ltag__link__pic"&gt;
      &lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--74Vbmx1Z--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://miro.medium.com/fit/c/96/96/1%2AmQriWVm9CtxlJy5V3j5_eQ.jpeg" alt="Vasant Chinnipilli"&gt;
    &lt;/div&gt;
  &lt;/a&gt;
  &lt;a href="https://medium.com/@vasantkumarchinnipilli/docker-for-devs-and-security-professionals-67fd14a75078" class="ltag__link__link"&gt;
    &lt;div class="ltag__link__content"&gt;
      &lt;h2&gt;Docker for Devs and Security Professionals | by Vasant Chinnipilli | Aug, 2020 | Medium&lt;/h2&gt;
      &lt;h3&gt;Vasant Chinnipilli ・ &lt;time&gt;Aug 5, 2020&lt;/time&gt; ・ 9 min read
      &lt;div class="ltag__link__servicename"&gt;
        &lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--KBvj_QRD--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://practicaldev-herokuapp-com.freetls.fastly.net/assets/medium_icon-90d5232a5da2369849f285fa499c8005e750a788fdbf34f5844d5f2201aae736.svg" alt="Medium Logo"&gt;
        Medium
      &lt;/div&gt;
    &lt;/h3&gt;
&lt;/div&gt;
  &lt;/a&gt;
&lt;/div&gt;


&lt;p&gt;In this blog post, I will walk you through the basic components, architecture, and basic commands of docker that help with da-to-day activities.&lt;/p&gt;

</description>
    </item>
    <item>
      <title>Vulnerability Management of Containers Images using OpenSource</title>
      <dc:creator>vasant</dc:creator>
      <pubDate>Wed, 12 Aug 2020 07:11:57 +0000</pubDate>
      <link>https://dev.to/cloudsecguy/vulnerability-management-of-containers-images-using-opensource-12f9</link>
      <guid>https://dev.to/cloudsecguy/vulnerability-management-of-containers-images-using-opensource-12f9</guid>
      <description>&lt;p&gt;Containers have revolutionised application development and have taken the enterprise by storm — in particular, the way they are built and scaled.&lt;/p&gt;

&lt;p&gt;The same flexibility that makes containers useful to developers also poses many security challenges. The biggest cloud security threat facing container users is the false assumption that containers equal security.&lt;/p&gt;

&lt;p&gt;In every container, there are naturally going to be many different and individually complex components that can all introduce security risks and vulnerabilities. As container adoption continues to grow, a strong focus on security is an absolute must.&lt;/p&gt;


&lt;div class="ltag__link"&gt;
  &lt;a href="https://medium.com/@vasantkumarchinnipilli/vulnerability-management-of-containers-using-opensource-1d864ccaaf83" class="ltag__link__link"&gt;
    &lt;div class="ltag__link__pic"&gt;
      &lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--74Vbmx1Z--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://miro.medium.com/fit/c/96/96/1%2AmQriWVm9CtxlJy5V3j5_eQ.jpeg" alt="Vasant Chinnipilli"&gt;
    &lt;/div&gt;
  &lt;/a&gt;
  &lt;a href="https://medium.com/@vasantkumarchinnipilli/vulnerability-management-of-containers-using-opensource-1d864ccaaf83" class="ltag__link__link"&gt;
    &lt;div class="ltag__link__content"&gt;
      &lt;h2&gt;Vulnerability Management of Containers using OpenSource | by Vasant Chinnipilli | Aug, 2020 | Medium&lt;/h2&gt;
      &lt;h3&gt;Vasant Chinnipilli ・ &lt;time&gt;Aug 5, 2020&lt;/time&gt; ・ 5 min read
      &lt;div class="ltag__link__servicename"&gt;
        &lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--KBvj_QRD--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://practicaldev-herokuapp-com.freetls.fastly.net/assets/medium_icon-90d5232a5da2369849f285fa499c8005e750a788fdbf34f5844d5f2201aae736.svg" alt="Medium Logo"&gt;
        Medium
      &lt;/div&gt;
    &lt;/h3&gt;
&lt;/div&gt;
  &lt;/a&gt;
&lt;/div&gt;


&lt;p&gt;In this Blog Post, we will be looking at the various open-source image scanning tools to identify and secure the container images from vulnerabilities.&lt;/p&gt;

</description>
      <category>devops</category>
      <category>docker</category>
      <category>kubernetes</category>
      <category>security</category>
    </item>
    <item>
      <title>How I pwned hundreds of users for less than $25?</title>
      <dc:creator>vasant</dc:creator>
      <pubDate>Fri, 24 Jul 2020 12:00:50 +0000</pubDate>
      <link>https://dev.to/cloudsecguy/how-i-pwned-hundreds-of-users-for-less-than-25-2m3h</link>
      <guid>https://dev.to/cloudsecguy/how-i-pwned-hundreds-of-users-for-less-than-25-2m3h</guid>
      <description>&lt;h1&gt;
  
  
  Introduction
&lt;/h1&gt;

&lt;p&gt;As long as employees do not consider security as their responsibility and use insanely Easy to Guess Passwords, no matter how much time and money organisations invest in training, right tools, and strict policies, security compromises are inevitable.&lt;/p&gt;


&lt;div class="ltag__link"&gt;
  &lt;a href="https://medium.com/the-innovation/how-i-pwned-hundreds-of-users-for-less-than-25-24a08322af4a" class="ltag__link__link" rel="noopener noreferrer"&gt;
    &lt;div class="ltag__link__pic"&gt;
      &lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fmiro.medium.com%2Fv2%2Fresize%3Afill%3A88%3A88%2F1%2AmQriWVm9CtxlJy5V3j5_eQ.jpeg" alt="Vasant Chinnipilli"&gt;
    &lt;/div&gt;
  &lt;/a&gt;
  &lt;a href="https://medium.com/the-innovation/how-i-pwned-hundreds-of-users-for-less-than-25-24a08322af4a" class="ltag__link__link" rel="noopener noreferrer"&gt;
    &lt;div class="ltag__link__content"&gt;
      &lt;h2&gt;How I pwned hundreds of users for less than $25? | by Vasant Chinnipilli | Medium&lt;/h2&gt;
      &lt;h3&gt;Vasant Chinnipilli ・ &lt;time&gt;Jul 18, 2020&lt;/time&gt; ・ 
      &lt;div class="ltag__link__servicename"&gt;
        &lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev.to%2Fassets%2Fmedium-f709f79cf29704f9f4c2a83f950b2964e95007a3e311b77f686915c71574fef2.svg" alt="Medium Logo"&gt;
        Medium
      &lt;/div&gt;
    &lt;/h3&gt;
&lt;/div&gt;
  &lt;/a&gt;
&lt;/div&gt;


&lt;p&gt;A while ago, I was engaged in performing an internal Penetration test for a reputed organisation which heavily relied on Windows infrastructure. The infrastructure was spread across different locations with a design called for every location to have its own domain, complete with numerous domain controllers (DCs), DNS servers, WINS servers, DHCP servers and work stations with so many missing patches.&lt;/p&gt;

&lt;p&gt;This blog post explains the different stages involved in a penetration testing and gaining access to a infrastructure&lt;/p&gt;

&lt;p&gt;Originally Published at: &lt;a href="https://www.cloudsecguy.dev" rel="noopener noreferrer"&gt;https://www.cloudsecguy.dev&lt;/a&gt;&lt;/p&gt;

</description>
      <category>security</category>
      <category>devops</category>
      <category>docker</category>
      <category>kubernetes</category>
    </item>
    <item>
      <title>Attacking CI/CD Tools The Crown Jewels — Series 2</title>
      <dc:creator>vasant</dc:creator>
      <pubDate>Fri, 24 Jul 2020 11:54:53 +0000</pubDate>
      <link>https://dev.to/cloudsecguy/attacking-ci-cd-tools-the-crown-jewels-series-2-33ad</link>
      <guid>https://dev.to/cloudsecguy/attacking-ci-cd-tools-the-crown-jewels-series-2-33ad</guid>
      <description>&lt;h1&gt;
  
  
  Introduction
&lt;/h1&gt;

&lt;p&gt;Automating to build projects based on pull requests is something DevOps teams cannot avoid in CI/CD pipelines. When you set up automated builds (also called auto builds), you create a list of branches and tags that you want to build. When you push code to a source code branch for one of those listed image tags, the push uses a webhook to trigger a new build.&lt;/p&gt;

&lt;p&gt;In the &lt;a href="https://dev.to/cloudsecguy/attacking-ci-cd-tools-the-crown-jewels-series-1-d5o"&gt;previous blog post&lt;/a&gt;, we have seen different techniques such as gaining access to build servers, cloud infrastructure, and backdooring build servers. &lt;/p&gt;


&lt;div class="ltag__link"&gt;
  &lt;a href="https://medium.com/@vasantkumarchinnipilli/attacking-ci-cd-tools-the-crown-jewels-series-2-fb97aba7bca7" class="ltag__link__link"&gt;
    &lt;div class="ltag__link__pic"&gt;
      &lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--74Vbmx1Z--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://miro.medium.com/fit/c/96/96/1%2AmQriWVm9CtxlJy5V3j5_eQ.jpeg" alt="Vasant Chinnipilli"&gt;
    &lt;/div&gt;
  &lt;/a&gt;
  &lt;a href="https://medium.com/@vasantkumarchinnipilli/attacking-ci-cd-tools-the-crown-jewels-series-2-fb97aba7bca7" class="ltag__link__link"&gt;
    &lt;div class="ltag__link__content"&gt;
      &lt;h2&gt;Attacking CI/CD Tools The Crown Jewels — Series 2 | by Vasant Chinnipilli | The Innovation | Jul, 2020 | Medium&lt;/h2&gt;
      &lt;h3&gt;Vasant Chinnipilli ・ &lt;time&gt;Jul 24, 2020&lt;/time&gt; ・ 4 min read
      &lt;div class="ltag__link__servicename"&gt;
        &lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--KBvj_QRD--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://practicaldev-herokuapp-com.freetls.fastly.net/assets/medium_icon-90d5232a5da2369849f285fa499c8005e750a788fdbf34f5844d5f2201aae736.svg" alt="Medium Logo"&gt;
        Medium
      &lt;/div&gt;
    &lt;/h3&gt;
&lt;/div&gt;
  &lt;/a&gt;
&lt;/div&gt;


&lt;p&gt;In this blog post, we will see how internal users with no access to build servers harness automated build triggers to their advantage to gain access to the build servers and infrastructure.&lt;/p&gt;

&lt;p&gt;Such attacks are evident in companies that open-source their projects and accept contributions from external sources.&lt;/p&gt;

</description>
      <category>devops</category>
      <category>aws</category>
      <category>security</category>
      <category>bash</category>
    </item>
    <item>
      <title>Attacking CI/CD Tools The Crown Jewels — Series 1</title>
      <dc:creator>vasant</dc:creator>
      <pubDate>Fri, 24 Jul 2020 11:23:18 +0000</pubDate>
      <link>https://dev.to/cloudsecguy/attacking-ci-cd-tools-the-crown-jewels-series-1-d5o</link>
      <guid>https://dev.to/cloudsecguy/attacking-ci-cd-tools-the-crown-jewels-series-1-d5o</guid>
      <description>&lt;p&gt;CI/CD toolchain which builds and deploys the infrastructure and code into production is as critical as a production-grade system. CI/CD pipelines are at the heart of daily operations for many organisations today, also the place in our technology stack where our infrastructure has access to many different resources, from development and production environment to analytics keys and code signing credentials.&lt;/p&gt;

&lt;p&gt;With such wide access comes security considerations making CI/CD tools effectively extend the attack surface of our production system to our build and automated test and deployment environment. We should always keep in mind that the attack vectors are not always external, internal threats always exist.&lt;/p&gt;


&lt;div class="ltag__link"&gt;
  &lt;a href="https://medium.com/@vasantkumarchinnipilli/attacking-ci-cd-tools-the-crown-jewels-series-1-519ce3619ad6" class="ltag__link__link"&gt;
    &lt;div class="ltag__link__pic"&gt;
      &lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--74Vbmx1Z--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://miro.medium.com/fit/c/96/96/1%2AmQriWVm9CtxlJy5V3j5_eQ.jpeg" alt="Vasant Chinnipilli"&gt;
    &lt;/div&gt;
  &lt;/a&gt;
  &lt;a href="https://medium.com/@vasantkumarchinnipilli/attacking-ci-cd-tools-the-crown-jewels-series-1-519ce3619ad6" class="ltag__link__link"&gt;
    &lt;div class="ltag__link__content"&gt;
      &lt;h2&gt;Attacking CI/CD Tools The Crown Jewels — Series 1 | by Vasant Chinnipilli | The Innovation | Jul, 2020 | Medium&lt;/h2&gt;
      &lt;h3&gt;Vasant Chinnipilli ・ &lt;time&gt;Jul 24, 2020&lt;/time&gt; ・ 5 min read
      &lt;div class="ltag__link__servicename"&gt;
        &lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--KBvj_QRD--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://practicaldev-herokuapp-com.freetls.fastly.net/assets/medium_icon-90d5232a5da2369849f285fa499c8005e750a788fdbf34f5844d5f2201aae736.svg" alt="Medium Logo"&gt;
        Medium
      &lt;/div&gt;
    &lt;/h3&gt;
&lt;/div&gt;
  &lt;/a&gt;
&lt;/div&gt;


&lt;p&gt;This blog post is an attempt to explain how malicious insiders, penetration testers, or attackers with limited privileges can target CI/CD tools to penetrate deep inside and gain access to the information infrastructure. The term developer in the blogpost refers to Developers with limited access, Grey box Penetration testers, and hackers who gained access to internal infrastructure.&lt;/p&gt;

&lt;p&gt;This blog post is originally published at &lt;a href="https://cloudsecguy.dev"&gt;https://cloudsecguy.dev&lt;/a&gt;&lt;/p&gt;

</description>
      <category>devops</category>
      <category>security</category>
      <category>aws</category>
      <category>azure</category>
    </item>
  </channel>
</rss>
