Cyber security

CloudPEASS : Cloud Privilege Escalation Awesome Script Suite

CloudPEASS is a suite of tools designed to help users identify potential privilege escalation paths and other security vulnerabilities in cloud environments, specifically Azure, GCP, and AWS.

The suite is currently in development and leverages techniques documented in HackTricks Cloud, along with insights from HackTricks AI, to analyze permissions and highlight potential attacks.

AzurePEASS

Functionality:

  • Permission Analysis: AzurePEASS checks all permissions in Azure and Entra ID to find privilege escalation paths and other potential attacks.
  • API Utilization: It uses ARM and Graph API endpoints to gather resource permissions and check Entra ID permissions across different scopes.
  • Token Requirements: Users need to provide tokens for both ARM and Graph APIs.

Usage:

  1. Obtain necessary tokens using Azure CLI commands.
  2. Run AzurePEASS with the tokens provided via command line or environment variables.
bash# Example usage
export AZURE_ARM_TOKEN=$(az account get-access-token --resource-type arm | jq -r .accessToken)
export AZURE_GRAPH_TOKEN=$(az account get-access-token --resource-type ms-graph | jq -r .accessToken)
python3 AzurePEASS.py [--arm-token <AZURE_MANAGEMENT_TOKEN>] [--graph-token <AZURE_GRAPH_TOKEN>]

GCPPEASS

Functionality:

  • Permission Analysis: GCPPEASS enumerates permissions in GCP and searches for privilege escalation paths and other attacks.
  • Brute Force Approach: It brute forces permissions across projects, folders, and organizations to minimize false negatives.
  • Resource Enumeration: Attempts to list VMs, Storages, Functions, and Service Accounts to check permissions.

Usage:

  1. Obtain a token using gcloud auth print-access-token.
  2. Run GCPPEASS with the token provided via command line or environment variable.
bash# Example usage
export CLOUDSDK_AUTH_ACCESS_TOKEN=$(gcloud auth print-access-token)
python3 GCPPEASS.py [--token <TOKEN>]

Key Features

  • HackTricks AI Integration: Both tools can use HackTricks AI to analyze permissions, though users can opt out with the --not-use-hacktricks-ai flag.
  • Output Customization: Results can be saved to a JSON file for further analysis.
  • Multithreading: Supports multithreading to improve performance.

CloudPEASS is a powerful toolset for cloud security auditing, helping users identify and mitigate potential security risks in their cloud environments.

Varshini

Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies.

Recent Posts

Understanding the Model Context Protocol (MCP) and How It Works

Introduction to the Model Context Protocol (MCP) The Model Context Protocol (MCP) is an open…

6 days ago

The file Command – Quickly Identify File Contents in Linux

While file extensions in Linux are optional and often misleading, the file command helps decode what a…

6 days ago

How to Use the touch Command in Linux

The touch command is one of the quickest ways to create new empty files or update timestamps…

6 days ago

How to Search Files and Folders in Linux Using the find Command

Handling large numbers of files is routine for Linux users, and that’s where the find command shines.…

6 days ago

How to Move and Rename Files in Linux with the mv Command

Managing files and directories is foundational for Linux workflows, and the mv (“move”) command makes it easy…

6 days ago

How to Create Directories in Linux with the mkdir Command

Creating directories is one of the earliest skills you'll use on a Linux system. The mkdir (make…

6 days ago