Cyber security

CloudPEASS : Cloud Privilege Escalation Awesome Script Suite

CloudPEASS is a suite of tools designed to help users identify potential privilege escalation paths and other security vulnerabilities in cloud environments, specifically Azure, GCP, and AWS.

The suite is currently in development and leverages techniques documented in HackTricks Cloud, along with insights from HackTricks AI, to analyze permissions and highlight potential attacks.

AzurePEASS

Functionality:

  • Permission Analysis: AzurePEASS checks all permissions in Azure and Entra ID to find privilege escalation paths and other potential attacks.
  • API Utilization: It uses ARM and Graph API endpoints to gather resource permissions and check Entra ID permissions across different scopes.
  • Token Requirements: Users need to provide tokens for both ARM and Graph APIs.

Usage:

  1. Obtain necessary tokens using Azure CLI commands.
  2. Run AzurePEASS with the tokens provided via command line or environment variables.
bash# Example usage
export AZURE_ARM_TOKEN=$(az account get-access-token --resource-type arm | jq -r .accessToken)
export AZURE_GRAPH_TOKEN=$(az account get-access-token --resource-type ms-graph | jq -r .accessToken)
python3 AzurePEASS.py [--arm-token <AZURE_MANAGEMENT_TOKEN>] [--graph-token <AZURE_GRAPH_TOKEN>]

GCPPEASS

Functionality:

  • Permission Analysis: GCPPEASS enumerates permissions in GCP and searches for privilege escalation paths and other attacks.
  • Brute Force Approach: It brute forces permissions across projects, folders, and organizations to minimize false negatives.
  • Resource Enumeration: Attempts to list VMs, Storages, Functions, and Service Accounts to check permissions.

Usage:

  1. Obtain a token using gcloud auth print-access-token.
  2. Run GCPPEASS with the token provided via command line or environment variable.
bash# Example usage
export CLOUDSDK_AUTH_ACCESS_TOKEN=$(gcloud auth print-access-token)
python3 GCPPEASS.py [--token <TOKEN>]

Key Features

  • HackTricks AI Integration: Both tools can use HackTricks AI to analyze permissions, though users can opt out with the --not-use-hacktricks-ai flag.
  • Output Customization: Results can be saved to a JSON file for further analysis.
  • Multithreading: Supports multithreading to improve performance.

CloudPEASS is a powerful toolset for cloud security auditing, helping users identify and mitigate potential security risks in their cloud environments.

Varshini

Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies.

Recent Posts

The Evolution of Cloud Technology: Where We Started and Where We’re Headed

Image credit:pexels.com If you think back to the early days of personal computing, you probably…

22 hours ago

The Evolution of Online Finance Tools In a Tech-Driven World

In an era defined by technological innovation, the way people handle and understand money has…

22 hours ago

A Complete Guide to Lenso.ai and Its Reverse Image Search Capabilities

The online world becomes more visually driven with every passing year. Images spread across websites,…

2 days ago

How Web Application Firewalls (WAFs) Work

General Working of a Web Application Firewall (WAF) A Web Application Firewall (WAF) acts as…

1 month ago

How to Send POST Requests Using curl in Linux

How to Send POST Requests Using curl in Linux If you work with APIs, servers,…

1 month ago

What Does chmod 777 Mean in Linux

If you are a Linux user, you have probably seen commands like chmod 777 while…

1 month ago