Cyber security

CloudPEASS : Cloud Privilege Escalation Awesome Script Suite

CloudPEASS is a suite of tools designed to help users identify potential privilege escalation paths and other security vulnerabilities in cloud environments, specifically Azure, GCP, and AWS.

The suite is currently in development and leverages techniques documented in HackTricks Cloud, along with insights from HackTricks AI, to analyze permissions and highlight potential attacks.

AzurePEASS

Functionality:

  • Permission Analysis: AzurePEASS checks all permissions in Azure and Entra ID to find privilege escalation paths and other potential attacks.
  • API Utilization: It uses ARM and Graph API endpoints to gather resource permissions and check Entra ID permissions across different scopes.
  • Token Requirements: Users need to provide tokens for both ARM and Graph APIs.

Usage:

  1. Obtain necessary tokens using Azure CLI commands.
  2. Run AzurePEASS with the tokens provided via command line or environment variables.
bash# Example usage
export AZURE_ARM_TOKEN=$(az account get-access-token --resource-type arm | jq -r .accessToken)
export AZURE_GRAPH_TOKEN=$(az account get-access-token --resource-type ms-graph | jq -r .accessToken)
python3 AzurePEASS.py [--arm-token <AZURE_MANAGEMENT_TOKEN>] [--graph-token <AZURE_GRAPH_TOKEN>]

GCPPEASS

Functionality:

  • Permission Analysis: GCPPEASS enumerates permissions in GCP and searches for privilege escalation paths and other attacks.
  • Brute Force Approach: It brute forces permissions across projects, folders, and organizations to minimize false negatives.
  • Resource Enumeration: Attempts to list VMs, Storages, Functions, and Service Accounts to check permissions.

Usage:

  1. Obtain a token using gcloud auth print-access-token.
  2. Run GCPPEASS with the token provided via command line or environment variable.
bash# Example usage
export CLOUDSDK_AUTH_ACCESS_TOKEN=$(gcloud auth print-access-token)
python3 GCPPEASS.py [--token <TOKEN>]

Key Features

  • HackTricks AI Integration: Both tools can use HackTricks AI to analyze permissions, though users can opt out with the --not-use-hacktricks-ai flag.
  • Output Customization: Results can be saved to a JSON file for further analysis.
  • Multithreading: Supports multithreading to improve performance.

CloudPEASS is a powerful toolset for cloud security auditing, helping users identify and mitigate potential security risks in their cloud environments.

Varshini

Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies.

Recent Posts

How Web Application Firewalls (WAFs) Work

General Working of a Web Application Firewall (WAF) A Web Application Firewall (WAF) acts as…

15 hours ago

How to Send POST Requests Using curl in Linux

How to Send POST Requests Using curl in Linux If you work with APIs, servers,…

15 hours ago

What Does chmod 777 Mean in Linux

If you are a Linux user, you have probably seen commands like chmod 777 while…

15 hours ago

How to Undo and Redo in Vim or Vi

Vim and Vi are among the most powerful text editors in the Linux world. They…

15 hours ago

How to Unzip and Extract Files in Linux

Working with compressed files is a common task for any Linux user. Whether you are…

15 hours ago

Free Email Lookup Tools and Reverse Email Search Resources

In the digital era, an email address can reveal much more than just a contact…

15 hours ago