• Earn real money by being active: Hello Guest, earn real money by simply being active on the forum — post quality content, get reactions, and help the community. Once you reach the minimum credit amount, you’ll be able to withdraw your balance directly. Learn how it works.

Nebula v2.0 - Cloud and DevOps Penetration Testing framework

Status
Not open for further replies.

itsMe

*KillmeMories*
Staff member
Administrator
Super Moderator
Hacker
Specter
Crawler
Shadow
Joined
Jan 8, 2019
Messages
56,607
Solutions
2
Reputation
32
Reaction score
100,453
Points
2,313
Credits
32,590
‎6 Years of Service‎
 
76%
Screenshot-2021-04-21-163716-768x665.jpg


Nebula

Nebula is a Cloud and (hopefully) DevOps Penetration Testing framework. It is built with modules for each provider and each functionality. As of April 2021, it only covers AWS, but is currently an ongoing project and hopefully will continue to grow to test GCP, Azure, Kubernetes, Docker, or automation engines like Ansible, Terraform, Chef, etc.

Currently covers:

  •     S3 Bucket name bruteforce
  •     IAM, EC2, S3, STS, and Lambda Enumeration
  •     IAM, EC2, STS, and S3 exploitation
  •     SSM Enumeration + Exploitation
  •     Custom HTTP User-Agent
  •     Enumerate Read Privileges (working on write privs)
  •     Reverse Shell
  •     No creds Reconnaisance

There are currently 67 modules covering:

  •     Reconnaissance
  •     Enumeration
  •     Exploit
  •     Cleanup
  •     Reverse Shell

Changelog v2.0

    STS AssumeRoleWithWebIdentity
    Reconnaissance crt.sh
    TCP Reverse Shell (Draft)
    Reverse Shell check_env that checks the environment of the victim system
    Updated getuid that checks IAM:GetUser, IAM:ListAttachedUserPolicies and IAM:GetPolicy
    Now it gets the credentials from ¬/.aws


To see this hidden content, you must like this content.
 
Status
Not open for further replies.
Back
Top