A Blazing fast Security Auditing tool for Kuberentes!!
Kubestrike performs numerous in depth checks on kubernetes infra to identify the security misconfigurations and challenges that devops engineers/developers are likely to encounter when using Kubernetes, especially in production and at scale.
kubestrike is Platform agnostic and works equally well across more than one platform such as self hosted kubernetes, Amazon EKS, Azure AKS, Google GKE etc.
- How To Install
- Types of Scans
- Current Capabilities
- Future improvements
- Suggestions
- Contributors
- Statistics
- License
- Support
- Find me here!!
To install this tool or clone and run this application, you'll need Git, python3 and pip installed on your computer. It is advised you install this tool in virtual environment
From your command line:
# Create python virtual environment
$ python3 -m venv env
# Activate python virtual environment
$ source env/bin/activate
# Clone this repository
$ git clone https://github.com/vchinnipilli/kubestrike.git
# Go into the repository
$ cd kubestrike
# Install dependencies
$ pip install -r requirements.txt
# Incase of prompt toolkit or selectmenu errors
$ pip install prompt-toolkit==1.0.15
$ pip install -r requirements.txt
# Gearing up Kubestrike
$ python -m kubestrike
# Result will be generated in the current working directory with the name of the target
To install and run this application, you'll need pip installed on your computer. From your command line:
# Create python virtual environment
$ python3 -m venv env
# Activate python virtual environment
$ source env/bin/activate
# Install using pip
$ pip install kubestrike
# Incase of prompt toolkit or selectmenu errors
$ pip install prompt-toolkit==1.0.15
$ pip install kubestrike
# Gearing up Kubestrike
$ python -m kubestrike
# Result will be generated in the current working directory with the name of the target
Use this link to view the Kubestrike container latest releases
# Spinning up the kubestrike Container
$ docker run -it --rm -v /Users/vasantchinnipilli/.kube/config:/root/.kube/config -v "$(pwd)":/kubestrike --name kubestrike cloudsecguy/kubestrike:v1.0.1
# Replace the user vasantchinnipilli above with your username or absolute path of kube config file
$ docker run -it --rm -v /Users/<yourusername>/.kube/config:/root/.kube/config -v "$(pwd)":/kubestrike --name kubestrike cloudsecguy/kubestrike:v1.0.1
# Gearing up Kubestrike
$ python -m kubestrike
# Result will be generated in the current working directory with the name of the target
Authenticated scan expects the user to have atleast read-only priviliges and provide a token during the scan. please use the below provided links to create read-only users
Create read-only user for Amazon eks
Create read-only user for Azure aks
Create read-only user for Google gke
Create a subject using Role based access control
# To grab a token from eks cluster
$ aws eks get-token --cluster-name cluster-name --region ap-southeast-2
# To grab a token from aks cluster
$ az aks get-credentials --resource-group myResourceGroup --name myAKSCluster
# To grab a token from gke cluster
$ gcloud container clusters get-credentials CLUSTER_NAME --zone=COMPUTE_ZONE
# To grab a token from service account
$ kubectl -n namespace get secret serviceaccount-token -o jsonpath='{.data.token}'
# To grab a token from a pod directly or via command execution bug
$ cat /run/secrets/kubernetes.io/serviceaccount/token
Unauthenticated scan will be successful incase of anonymous access is permitted on the target cluster
- Scans Self Managed and cloud provider managed kuberentes infra
- Reconnaissance phase checks for various services or open ports
- Performs automated scans incase of insecure, readwrite or readonly services are enabled
- Performs both authenticated scans and unauthenticated scans
- Scans for wide range of IAM Misconfigurations in the cluster
- Scans for wide range of Misconfigured containers
- Scans for wide range of Misconfigured Pod Security Policies
- Scans for wide range of Misconfigured Network policies
- Scans the privileges of a subject in the cluster
- Run commands on the containers and streams back the output
- Provides the endpoints of the misconfigured services
- Provides possible privilege escalation details
- Elaborative report with detailed explanation
- Automated exploitation based on the issues identified
- api and cicd automation friendly
- A Decent FrontEnd to make the lives easier
Kubestrike is an opensource and emailware. Meaning, if you liked using this tool or it has helped you in any way or if you have any suggestions/improvements, I'd like you send me an email at vchinnipilli@gmail.com about anything you'd want to say about this tool. I'd really appreciate it!
The MIT License
vasant chinnipilli builds and maintains kubestrike to audit and secure kuberentes infrastructure.
Start with Documentation - will be available soon for quick tutorials and examples.
If you need direct support you can contact me at vchinnipilli@gmail.com.