A Blazing fast Security Auditing tool for Kubernetes. Kubestriker performs numerous in depth checks on kubernetes infra to identify the security misconfigurations and challenges that devops engineers/developers are likely to encounter when using Kubernetes, especially in production and at scale. kubestriker is Platform agnostic and works equally well across more than one platform such as self hosted kubernetes, Amazon EKS, Azure AKS, Google GKE etc.
Kubestriker performs numerous in depth checks on kubernetes infra to identify the security misconfigurations and challenges that devops engineers/developers are likely to encounter when using Kubernetes, especially in production and at scale.
kubestriker is Platform agnostic and works equally well across more than one platform such as self hosted kubernetes, Amazon EKS, Azure AKS, Google GKE etc.
To install this tool or clone and run this application, you'll need Git, python3 and pip installed on your computer. It is advised you install this tool in virtual environment
From your command line:
# Create python virtual environment
$ python3 -m venv env
# Activate python virtual environment
$ source env/bin/activate
# Clone this repository
$ git clone https://github.com/vchinnipilli/kubestriker.git
# Go into the repository
$ cd kubestriker
# Install dependencies
$ pip install -r requirements.txt
# Incase of prompt toolkit or selectmenu errors
$ pip install prompt-toolkit==1.0.15
$ pip install -r requirements.txt
# Gearing up Kubestriker
$ python -m kubestriker
# Result will be generated in the current working directory with the name of the target
To install and run this application, you'll need pip installed on your computer. From your command line:
# Create python virtual environment
$ python3 -m venv env
# Activate python virtual environment
$ source env/bin/activate
# Install using pip
$ pip install kubestriker
# Incase of prompt toolkit or selectmenu errors
$ pip install prompt-toolkit==1.0.15
$ pip install kubestriker
# Gearing up Kubestriker
$ python -m kubestriker
# Result will be generated in the current working directory with the name of the target
Use this link to view the Kubestriker container latest releases
# Spinning up the kubestriker Container
$ docker run -it --rm -v /Users/vasantchinnipilli/.kube/config:/root/.kube/config -v "$(pwd)":/kubestriker --name kubestriker cloudsecguy/kubestriker:v1.0.0
# Replace the user vasantchinnipilli above with your username or absolute path of kube config file
$ docker run -it --rm -v /Users/<yourusername>/.kube/config:/root/.kube/config -v "$(pwd)":/kubestriker --name kubestriker cloudsecguy/kubestriker:v1.0.0
# Gearing up Kubestriker
$ python -m kubestriker
# Result will be generated in the current working directory with the name of the target
Authenticated scan expects the user to have atleast read-only privileges and provide a token during the scan. please use the below provided links to create read-only users
Create read-only user for Amazon eks Create read-only user for Azure aks Create read-only user for Google gke Create a subject using Role based access control
# To grab a token from eks cluster
$ aws eks get-token --cluster-name cluster-name --region ap-southeast-2
# To grab a token from aks cluster
$ az aks get-credentials --regroup myResourceGroup --name myAKSCluster
# To grab a token from gke cluster
$ gcloud container clusters get-credentials CLUSTER_NAME --zone=COMPUTE_ZONE
# To grab a token from service account
$ kubectl -n namespace get secret serviceaccount-token -o jsonpath='{.data.token}'
# To grab a token from a pod directly or via command execution bug
$ cat /run/secrets/kubernetes.io/serviceaccount/token
Unauthenticated scan will be successful incase of anonymous access is permitted on the target cluster
Kubestriker is an opensource and emailware. Meaning, if you liked using this tool or it has helped you in any way or if you have any suggestions/improvements, I'd like you send me an email at [email protected] about anything you'd want to say about this tool. I'd really appreciate it!
Author: vchinnipilli Live Demo: View The Demo Download Link: Download The Source Code Official Website: https://github.com/vchinnipilli/kubestriker License: Apache License
Our original Kubernetes tool list was so popular that we've curated another great list of tools to help you improve your functionality with the platform.
Top Web & Mobile Application Development Company in India & USA. We specialize in Golang, Ruby on Rails, Symfony, Laravel PHP, Python, Angular, Mobile Apps, Blockchain, & Chatbots
Myth: Kubernetes dashboard, in general, is a security risk Fact: The security concern is not directly related to the dashboard itself, but it accounts for how well you deploy it.
This article explains how you can leverage Kubernetes to reduce multi cloud complexities and improve stability, scalability, and velocity.
In this article, take a look at ten cyber security tools to watch out for in 2021, including NMap, Wireshark, Metasploit, and more!