What is Peirates?
What is Peirates? Peirates is a penetration testing tool for Kubernetes, focused on privilege escalation and lateral movement. It has an interactive interface, wherein the penetration tester chooses actions from the techniques that Peirates encodes. Some of the techniques in Peirates will give you administrative access to the cluster in one-shot. Others are intended to get you tokens for an increasing number of service accounts that you can use to move laterally, steal secrets, and chain together to achieve the goals of your penetration test.
Note: Peirates is focused entirely on attacking a Kubernetes cluster. This may not be legal in your country or in the way that you use it. Please discuss its use with your lawyer and that of any organizations that own or participate in the management of the cluster.
How Do I Use Peirates?
When you gain or are given remote code execution capability in a container running in a Kubernetes cluster, you use Peirates to expand that access. Peirates is a staticly-compiled binary that you can download or compile yourself using a golang compiler. Place this binary into the container that is your starting point, mark it executable and run it. You’ll be presented with a menu of options – use these to gain access. Peirates is especially focused on gathering service account’s tokens. If there are actions that you know how to accomplish with kubectl commands that aren’t in Peirates, you have two options: (1) copy the service account token from Peirates into a kubectl command or (2) create code in Peirates to accomplish your goal, and submit a pull request so you can get credit and everyone else gets the benefit.
What Can Peirates Do?
Peirates has a number of Kubernetes penetration testing features. It’s an interactive tool, intended to allow you to escalate privilege, move laterally, and take over clusters.
The list of features is growing, as this active Open Source project continues to evolve. The current list:
- Gain a reverse shell on a node, using a hostPath-mounting pod
- Pull service account tokens from bucket storage (GCS-only)
- Pull service account tokens from secrets
- Run a token-dumping command on all pods, abusing Kubelets
- Gain IAM credentials from an AWS or GCP Metadata server
- Transfer itself into another pod, allowing lateral movement
When it comes to learning how to use something, a video is worth a thousand words, so check out our demo videos below!
Where can I download Peirates?
Peirates can be downloaded from InGuardians’ GitHub repository here, or clicking the link below
Want InGuardians to advise on and/or break into your Kubernetes deployment?
Peirates Demo Videos
Want to attend training on Kubernetes attack and defense?
August 3 - 6
Black Hat USA
A Purple Team View – Attacking And Defending Linux, Docker, And Kubernetes
Jay Beale, CTO, InGuardians
Learn how to attack and thoroughly lock down Linux and container-based systems from Jay Beale, the creator of Bastille Linux, the Center for Internet Security's first Linux Security Benchmark, and Kubernetes security projects including Bust-a-Kube.
In this expanded and updated 4-day version of the well-reviewed Aikido on the Command Line class, we focus strongly on attacking Linux containers, Docker and the container orchestration system, Kubernetes!