{"id":2613,"date":"2019-03-28T10:59:04","date_gmt":"2019-03-28T18:59:04","guid":{"rendered":"https:\/\/zed.inguardians.com\/?page_id=2613"},"modified":"2019-06-27T16:13:33","modified_gmt":"2019-06-27T23:13:33","slug":"peirates","status":"publish","type":"page","link":"https:\/\/zed.inguardians.com\/peirates\/","title":{"rendered":"Peirates"},"content":{"rendered":"

[et_pb_section fb_built=”1″ _builder_version=”3.22.3″][et_pb_row custom_padding=”27px|0px|27px|0px|false|false” _builder_version=”3.25″ background_size=”initial” background_position=”top_left” background_repeat=”repeat” link_option_url=”https:\/\/github.com\/inguardians\/peirates”][et_pb_column type=”4_4″ _builder_version=”3.0.47″ custom_padding=”|||” custom_padding__hover=”|||”][et_pb_blurb title=”Kubernetes Penetration Tool” url=”https:\/\/github.com\/inguardians\/peirates” url_new_window=”on” image=”http:\/\/zed.inguardians.com\/wp-content\/uploads\/2019\/03\/PeiratesGH.png” admin_label=”Logo w Hidden Link” _builder_version=”3.22.5″ header_font=”Arial||||||||” header_text_align=”center” header_font_size=”26px” body_font=”Arial||||||||” body_font_size=”20px” text_orientation=”center” z_index_tablet=”500″][\/et_pb_blurb][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=”3.25″][et_pb_column type=”4_4″ _builder_version=”3.22.5″ custom_padding=”|||” custom_padding__hover=”|||”][et_pb_text _builder_version=”3.22.5″]<\/p>\n

What is Peirates?<\/strong><\/p>\n

What is Peirates?\u00a0Peirates is a penetration testing tool for Kubernetes, focused on privilege escalation and lateral movement. It has an interactive interface, wherein the penetration tester chooses actions from the techniques that Peirates encodes. Some of the techniques in Peirates will give you administrative access to the cluster in one-shot. Others are intended to get you tokens for an increasing number of service accounts that you can use to move laterally, steal secrets, and chain together to achieve the goals of your penetration test.\u00a0<\/p>\n

Note: Peirates is focused entirely on attacking a Kubernetes cluster. This may not be legal in your country or in the way that you use it. Please discuss its use with your lawyer and that of any organizations that own or participate in the management of the cluster.\u00a0<\/p>\n

How Do I Use Peirates?<\/strong>\u00a0<\/p>\n

When you gain or are given remote code execution capability in a container running in a Kubernetes cluster, you use Peirates to expand that access. Peirates is a staticly-compiled binary that you can download or compile yourself using a golang compiler. Place this binary into the container that is your starting point, mark it executable and run it. You\u2019ll be presented with a menu of options \u2013 use these to gain access. Peirates is especially focused on gathering service account\u2019s tokens. If there are actions that you know how to accomplish with kubectl commands that aren\u2019t in Peirates, you have two options: (1) copy the service account token from Peirates into a kubectl command or (2) create code in Peirates to accomplish your goal, and submit a pull request so you can get credit and everyone\u00a0 else gets the benefit.\u00a0\u00a0<\/p>\n

What Can Peirates Do?\u00a0<\/strong><\/p>\n

Peirates has a number of Kubernetes penetration testing features. It\u2019s an interactive tool, intended to allow you to escalate privilege, move laterally, and take over clusters.\u00a0<\/p>\n

The list of features is growing, as this active Open Source project continues to evolve. The current list:<\/p>\n