Cyber security

CloudPEASS : Cloud Privilege Escalation Awesome Script Suite

CloudPEASS is a suite of tools designed to help users identify potential privilege escalation paths and other security vulnerabilities in cloud environments, specifically Azure, GCP, and AWS.

The suite is currently in development and leverages techniques documented in HackTricks Cloud, along with insights from HackTricks AI, to analyze permissions and highlight potential attacks.

AzurePEASS

Functionality:

  • Permission Analysis: AzurePEASS checks all permissions in Azure and Entra ID to find privilege escalation paths and other potential attacks.
  • API Utilization: It uses ARM and Graph API endpoints to gather resource permissions and check Entra ID permissions across different scopes.
  • Token Requirements: Users need to provide tokens for both ARM and Graph APIs.

Usage:

  1. Obtain necessary tokens using Azure CLI commands.
  2. Run AzurePEASS with the tokens provided via command line or environment variables.
bash# Example usage
export AZURE_ARM_TOKEN=$(az account get-access-token --resource-type arm | jq -r .accessToken)
export AZURE_GRAPH_TOKEN=$(az account get-access-token --resource-type ms-graph | jq -r .accessToken)
python3 AzurePEASS.py [--arm-token <AZURE_MANAGEMENT_TOKEN>] [--graph-token <AZURE_GRAPH_TOKEN>]

GCPPEASS

Functionality:

  • Permission Analysis: GCPPEASS enumerates permissions in GCP and searches for privilege escalation paths and other attacks.
  • Brute Force Approach: It brute forces permissions across projects, folders, and organizations to minimize false negatives.
  • Resource Enumeration: Attempts to list VMs, Storages, Functions, and Service Accounts to check permissions.

Usage:

  1. Obtain a token using gcloud auth print-access-token.
  2. Run GCPPEASS with the token provided via command line or environment variable.
bash# Example usage
export CLOUDSDK_AUTH_ACCESS_TOKEN=$(gcloud auth print-access-token)
python3 GCPPEASS.py [--token <TOKEN>]

Key Features

  • HackTricks AI Integration: Both tools can use HackTricks AI to analyze permissions, though users can opt out with the --not-use-hacktricks-ai flag.
  • Output Customization: Results can be saved to a JSON file for further analysis.
  • Multithreading: Supports multithreading to improve performance.

CloudPEASS is a powerful toolset for cloud security auditing, helping users identify and mitigate potential security risks in their cloud environments.

Varshini

Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies.

Recent Posts

WhatsMyName App – Find Anyone Across 640+ Platforms

Overview WhatsMyName is a free, community-driven OSINT tool designed to identify where a username exists…

4 days ago

Analyzing Directory Size Linux Tools Explained

Managing disk usage is a crucial task for Linux users and administrators alike. Understanding which…

5 days ago

Understanding Disk Usage with du Command

Efficient disk space management is vital in Linux, especially for system administrators who manage servers…

5 days ago

How to Check Directory Size in Linux

Knowing how to check directory sizes in Linux is essential for managing disk space and…

5 days ago

Essential Commands for Linux User Listing

Managing user accounts is a core responsibility for any Linux administrator. Whether you’re securing a…

5 days ago

Command-Line Techniques for Listing Linux Users

Linux offers powerful command-line tools for system administrators to view and manage user accounts. Knowing…

5 days ago