在线时间:8:00-16:00
迪恩网络APP
随时随地掌握行业动态
扫描二维码
关注迪恩网络微信公众号
开源软件名称(OpenSource Name):aquasecurity/kube-hunter开源软件地址(OpenSource Url):https://github.com/aquasecurity/kube-hunter开源编程语言(OpenSource Language):Python 99.2%开源软件介绍(OpenSource Introduction):kube-hunter hunts for security weaknesses in Kubernetes clusters. The tool was developed to increase awareness and visibility for security issues in Kubernetes environments. You should NOT run kube-hunter on a Kubernetes cluster that you don't own! Run kube-hunter: kube-hunter is available as a container (aquasec/kube-hunter), and we also offer a web site at kube-hunter.aquasec.com where you can register online to receive a token allowing you to see and share the results online. You can also run the Python code yourself as described below. Explore vulnerabilities: The kube-hunter knowledge base includes articles about discoverable vulnerabilities and issues. When kube-hunter reports an issue, it will show its VID (Vulnerability ID) so you can look it up in the KB at https://aquasecurity.github.io/kube-hunter/ Contribute: We welcome contributions, especially new hunter modules that perform additional tests. If you would like to develop your modules please read Guidelines For Developing Your First kube-hunter Module. Table of ContentsKubernetes ATT&CK Matrixkube-hunter now supports the new format of the Kubernetes ATT&CK matrix. While kube-hunter's vulnerabilities are a collection of creative techniques designed to mimic an attacker in the cluster (or outside it) The Mitre's ATT&CK defines a more general standardised categories of techniques to do so. You can think of kube-hunter vulnerabilities as small steps for an attacker, which follows the track of a more general technique he would aim for. Most of kube-hunter's hunters and vulnerabilities can closly fall under those techniques, That's why we moved to follow the Matrix standard. Some kube-hunter vulnerabities which we could not map to Mitre technique, are prefixed with the HuntingWhere should I run kube-hunter?There are three different ways to run kube-hunter, each providing a different approach to detecting weaknesses in your cluster: Run kube-hunter on any machine (including your laptop), select Remote scanning and give the IP address or domain name of your Kubernetes cluster. This will give you an attackers-eye-view of your Kubernetes setup. You can run kube-hunter directly on a machine in the cluster, and select the option to probe all the local network interfaces. You can also run kube-hunter in a pod within the cluster. This indicates how exposed your cluster would be if one of your application pods is compromised (through a software vulnerability, for example). ( Scanning optionsFirst check for these pre-requisites. By default, kube-hunter will open an interactive session, in which you will be able to select one of the following scan options. You can also specify the scan option manually from the command line. These are your options:
To specify remote machines for hunting, select option 1 or use the
To specify interface scanning, you can use the
To specify a specific CIDR to scan, use the
Set Also note, that this is always done when using AuthenticationIn order to mimic an attacker in it's early stages, kube-hunter requires no authentication for the hunt.
Active HuntingActive hunting is an option in which kube-hunter will exploit vulnerabilities it finds, to explore for further vulnerabilities. The main difference between normal and active hunting is that a normal hunt will never change the state of the cluster, while active hunting can potentially do state-changing operations on the cluster, which could be harmful. By default, kube-hunter does not do active hunting. To active hunt a cluster, use the List of testsYou can see the list of tests with the To see active hunting tests as well as passive:
Nodes MappingTo see only a mapping of your nodes network, run with OutputTo control logging, you can specify a log level, using the
DispatchingBy default, the report will be dispatched to
Advanced UsageAzure Quick ScanningWhen running as a Pod in an Azure or AWS environment, kube-hunter will fetch subnets from the Instance Metadata Service. Naturally this makes the discovery process take longer.
To hardlimit subnet scanning to a Custom HuntingCustom hunting enables advanced users to have control over what hunters gets registered at the start of a hunt. If you know what you are doing, this can help if you want to adjust kube-hunter's hunting and discovery process for your needs. Example:
Enabling Custom hunting removes all hunters from the hunting process, except the given whitelisted hunters. The Example:
Notice: Due to kube-huner's architectural design, the following "Core Hunters/Classes" will always register (even when using custom hunting):
DeploymentThere are three methods for deploying kube-hunter: On MachineYou can run kube-hunter directly on your machine. PrerequisitesYou will need the following installed:
Install with pipInstall:
Run:
Run from sourceClone the repository:
Install module dependencies. (You may prefer to do this within a Virtual Environment)
Run:
If you want to use pyinstaller/py2exe you need to first run the install_imports.py script. ContainerAqua Security maintains a containerized version of kube-hunter at The Dockerfile in this repository allows you to build a containerized version without the reporting plugin. If you run kube-hunter container with the host network, it will be able to probe all the interfaces on the host:
Note for Docker for Mac/Windows: Be aware that the "host" for Docker for Mac or Windows is the VM that Docker runs containers within. Therefore specifying
PodThis option lets you discover what running a malicious container can do/discover on your cluster. This gives a perspective on what an attacker could do if they were able to compromise a pod, perhaps through a software vulnerability. This may reveal significantly more vulnerabilities. The example
ContributionTo read the contribution guidelines, Click here LicenseThis repository is available under the Apache License 2.0. |
2023-10-27
2022-08-15
2022-08-17
2022-09-23
2022-08-13
请发表评论