Coder Social home page Coder Social logo

hacktricks-cloud's Introduction

HackTricks Cloud

Learn AWS hacking from zero to hero with htARTE (HackTricks AWS Red Team Expert)!

Other ways to support HackTricks:

Hacktricks logos & motion designed by @ppiernacho.

{% hint style="success" %} Welcome to the page where you will find each hacking trick/technique/whatever related to CI/CD & Cloud I have learnt in CTFs, real life environments, researching, and reading researches and news. {% endhint %}

Pentesting CI/CD Methodology

In the HackTricks CI/CD Methodology you will find how to pentest infrastructure related to CI/CD activities. Read the following page for an introduction:

{% content-ref url="pentesting-ci-cd/pentesting-ci-cd-methodology.md" %} pentesting-ci-cd-methodology.md {% endcontent-ref %}

Pentesting Cloud Methodology

In the HackTricks Cloud Methodology you will find how to pentest cloud environments. Read the following page for an introduction:

{% content-ref url="pentesting-cloud/pentesting-cloud-methodology.md" %} pentesting-cloud-methodology.md {% endcontent-ref %}

License & Disclaimer

Check them in:

{% content-ref url="https://app.gitbook.com/s/-L_2uGJGU7AVNRcqRvEi/welcome/hacktricks-values-and-faq" %} HackTricks Values & FAQ {% endcontent-ref %}

Github Stats

HackTricks Cloud Github Stats

Learn AWS hacking from zero to hero with htARTE (HackTricks AWS Red Team Expert)!

Other ways to support HackTricks:

hacktricks-cloud's People

Contributors

3v4si0n avatar ahboon avatar amkuipers avatar anon-exploiter avatar anugrahsr avatar ari-weinberg avatar carlospolop avatar cfpadok avatar congon4tor avatar cosad3s avatar davidkutz-marks avatar esonhugh avatar fr4nk3nst1ner avatar hasshido avatar luiseok avatar m4dn3g4t1v3 avatar maxdcb avatar mikensec avatar nopcorn avatar paupu avatar r0binak avatar r34w0lf avatar redskycyber avatar stevejubs avatar thomaslachaux avatar thureinoo avatar tochirou avatar valenbg1 avatar xybytes avatar za avatar

Stargazers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

Watchers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

hacktricks-cloud's Issues

External content citations/references/credits

Thanks for the resource. I do, however, have some concerns about the source of some of this content and lack of sufficient crediting of the original authors.

For example, the following two articles are identical:
https://hackingthe.cloud/aws/general-knowledge/connection-tracking/
https://cloud.hacktricks.xyz/pentesting-cloud/aws-security/aws-basic-information/connection-tracking

I don't see anything in the hacktricks article referencing the original source or crediting the original author. I feel this is particularly relevant considering that hacktricks are seeking sponsorship from both individuals and organisations to support the project.

Copied content

There appear to be a number of pages of content which are directly copied from https://frichetten.com. Did you get permission to copy that content? This seems inappropriate to copy so much content directly like this.

GitHub Actions Cache Poisoning Details

The current GitHub Actions cache poisoning section (https://cloud.hacktricks.xyz/pentesting-ci-cd/github-security/abusing-github-actions/gh-actions-cache-poisoning) is a bit light on details.

I've done some research on this and written some PoC code that I'd like to add. A couple of key points:

  • Token used to write to cache is valid for 6 hours is not invalidated after workflow finishes. (working as intended per GitHub)
  • Cache keys/version are set client side, no server side validation at all (working as intended per GitHub).
  • Cache file itself is not validated when there is a cache hit (it is just a zstd compressed archive), so a poisoned cache entry can overwrite scripts, package.json, etc, even if the intended cache value is a specific directory.

POC Code to write to cache and steal cache tokens: https://github.com/AdnaneKhan/ActionsCacheBlasting

Feel free to add or I can create a PR (will end up re-writing most of the existing information), unfortunately the Scribe Security article was fairly light on how to actually poison caches. Fortunately, I like sharing knowledge to help people hack all the things :)

Adding new content to cloud.hacktricks.xyz

Hi,

First, thank you for cloud.hacktricks.xyz this is really awesome ! I would like to contribute by adding new content regarding CI/CD pipeline and more specifically on secret extraction.

We developed a tool called Nord Stream which automate everything to extract secrets that are stored inside CI/CD environments. The tools currently support Azure Devops, GitHub and GitLab. You can found it here: https://github.com/synacktiv/nord-stream. We also have a blog post explaining how secrets are stored in those systems and how we can extract them automatically (https://www.synacktiv.com/publications/cicd-secrets-extraction-tips-and-tricks).

If you are interested I could add this to cloud.hacktricks.xyz. I just don't know where I can add all of this because there are no sections for Azure Devops and GitLab and I don't know If the general Pentesting CI/CD Methodology section is the appropriate place to put all of this.

You can arrange this as you wish, but I could also open a PR if you help me to organize everything :)

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    ๐Ÿ–– Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. ๐Ÿ“Š๐Ÿ“ˆ๐ŸŽ‰

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google โค๏ธ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.