1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111
| CDK (Container DucK) CDK Version(GitCommit): 251f18c614f925f26569f9cc6177c3b3fd656bd2 Zero-dependency cloudnative k8s/docker/serverless penetration toolkit by cdxy & neargle Find tutorial, configuration and use-case in https://github.com/cdk-team/CDK/
[ Information Gathering - System Info ] /usr/bin/chfn /usr/bin/chsh /usr/bin/gpasswd /usr/bin/mount /usr/bin/newgrp /usr/bin/passwd /usr/bin/su /usr/bin/umount /bin/chfn /bin/chsh /bin/gpasswd /bin/mount /bin/newgrp /bin/passwd /bin/su /bin/umount
[ Information Gathering - Services ]
[ Information Gathering - Commands and Capabilities ] CapInh: 0000000000000000 CapPrm: 0000000000000000 CapEff: 0000000000000000 CapBnd: 00000000a80425fb CapAmb: 0000000000000000 Cap decode: 0x0000000000000000 = [*] Maybe you can exploit the Capabilities below:
[ Information Gathering - Mounts ] 0:389 / / rw,relatime - overlay overlay rw,lowerdir=/var/lib/rancher/k3s/agent/containerd/io.containerd.snapshotter.v1.overlayfs/snapshots/783/fs:/var/lib/rancher/k3s/agent/containerd/io.containerd.snapshotter.v1.overlayfs/snapshots/782/fs:/var/lib/rancher/k3s/agent/containerd/io.containerd.snapshotter.v1.overlayfs/snapshots/781/fs:/var/lib/rancher/k3s/agent/containerd/io.containerd.snapshotter.v1.overlayfs/snapshots/114/fs:/var/lib/rancher/k3s/agent/containerd/io.containerd.snapshotter.v1.overlayfs/snapshots/113/fs:/var/lib/rancher/k3s/agent/containerd/io.containerd.snapshotter.v1.overlayfs/snapshots/112/fs:/var/lib/rancher/k3s/agent/containerd/io.containerd.snapshotter.v1.overlayfs/snapshots/111/fs:/var/lib/rancher/k3s/agent/containerd/io.containerd.snapshotter.v1.overlayfs/snapshots/110/fs:/var/lib/rancher/k3s/agent/containerd/io.containerd.snapshotter.v1.overlayfs/snapshots/109/fs:/var/lib/rancher/k3s/agent/containerd/io.containerd.snapshotter.v1.overlayfs/snapshots/108/fs:/var/lib/rancher/k3s/agent/containerd/io.containerd.snapshotter.v1.overlayfs/snapshots/107/fs:/var/lib/rancher/k3s/agent/containerd/io.containerd.snapshotter.v1.overlayfs/snapshots/106/fs,upperdir=/var/lib/rancher/k3s/agent/containerd/io.containerd.snapshotter.v1.overlayfs/snapshots/2136/fs,workdir=/var/lib/rancher/k3s/agent/containerd/io.containerd.snapshotter.v1.overlayfs/snapshots/2136/work 0:447 / /proc rw,nosuid,nodev,noexec,relatime - proc proc rw 0:448 / /dev rw,nosuid - tmpfs tmpfs rw,size=65536k,mode=755,inode64 0:449 / /dev/pts rw,nosuid,noexec,relatime - devpts devpts rw,gid=5,mode=620,ptmxmode=666 0:394 / /dev/mqueue rw,nosuid,nodev,noexec,relatime - mqueue mqueue rw 0:414 / /sys ro,nosuid,nodev,noexec,relatime - sysfs sysfs ro 0:30 / /sys/fs/cgroup ro,nosuid,nodev,noexec,relatime - cgroup2 cgroup rw,nsdelegate,memory_recursiveprot 252:3 /var/lib/kubelet/pods/cf3c0f7c-6f8e-4ec7-96ab-afaabf79f3b9/etc-hosts /etc/hosts rw,relatime - ext4 /dev/vda3 rw 252:3 /var/lib/kubelet/pods/cf3c0f7c-6f8e-4ec7-96ab-afaabf79f3b9/containers/vuln-container/f30344ca /dev/termination-log rw,relatime - ext4 /dev/vda3 rw 252:3 /var/lib/rancher/k3s/agent/containerd/io.containerd.grpc.v1.cri/sandboxes/3d083d23aa076f9e4d21b1499fc54b3c610ec06454d7f646e19229c0e660f714/hostname /etc/hostname rw,relatime - ext4 /dev/vda3 rw 252:3 /var/lib/rancher/k3s/agent/containerd/io.containerd.grpc.v1.cri/sandboxes/3d083d23aa076f9e4d21b1499fc54b3c610ec06454d7f646e19229c0e660f714/resolv.conf /etc/resolv.conf rw,relatime - ext4 /dev/vda3 rw 0:368 / /dev/shm rw,relatime - tmpfs shm rw,size=65536k,inode64 0:366 / /run/secrets/kubernetes.io/serviceaccount ro,relatime - tmpfs tmpfs rw,size=7441152k,inode64 0:447 /bus /proc/bus ro,nosuid,nodev,noexec,relatime - proc proc rw 0:447 /fs /proc/fs ro,nosuid,nodev,noexec,relatime - proc proc rw 0:447 /irq /proc/irq ro,nosuid,nodev,noexec,relatime - proc proc rw 0:447 /sys /proc/sys ro,nosuid,nodev,noexec,relatime - proc proc rw 0:447 /sysrq-trigger /proc/sysrq-trigger ro,nosuid,nodev,noexec,relatime - proc proc rw 0:450 / /proc/acpi ro,relatime - tmpfs tmpfs ro,inode64 0:448 /null /proc/kcore rw,nosuid - tmpfs tmpfs rw,size=65536k,mode=755,inode64 0:448 /null /proc/keys rw,nosuid - tmpfs tmpfs rw,size=65536k,mode=755,inode64 0:448 /null /proc/timer_list rw,nosuid - tmpfs tmpfs rw,size=65536k,mode=755,inode64 0:451 / /proc/scsi ro,relatime - tmpfs tmpfs ro,inode64 0:452 / /sys/firmware ro,relatime - tmpfs tmpfs ro,inode64 0:453 / /sys/devices/virtual/powercap ro,relatime - tmpfs tmpfs ro,inode64
[ Information Gathering - Net Namespace ] container net namespace isolated.
[ Information Gathering - Sysctl Variables ]
[ Information Gathering - DNS-Based Service Discovery ] error when requesting coreDNS: lookup any.any.svc.cluster.local. on 10.43.0.10:53: no such host error when requesting coreDNS: lookup any.any.any.svc.cluster.local. on 10.43.0.10:53: no such host
[ Discovery - K8s API Server ] err found in post request, error response code: 401 Unauthorized. api-server forbids anonymous request. response:{"kind":"Status","apiVersion":"v1","metadata":{},"status":"Failure","message":"Unauthorized","reason":"Unauthorized","code":401}
[ Discovery - K8s Service Account ] service-account is available err found in post request, error response code: 403 Forbidden.
[ Discovery - Cloud Provider Metadata API ] Alibaba Cloud Metadata API available in http://100.100.100.200/latest/meta-data/ Docs: https://help.aliyun.com/knowledge_detail/49122.html
[ Exploit Pre - Kernel Exploits ] [+] [CVE-2022-0847] DirtyPipe
Details: https://dirtypipe.cm4all.com/ Exposure: less probable Tags: ubuntu=(20.04|21.04),debian=11 Download URL: https://haxx.in/files/dirtypipez.c
[+] [CVE-2021-22555] Netfilter heap out-of-bounds write
Details: https://google.github.io/security-research/pocs/linux/cve-2021-22555/writeup.html Exposure: less probable Tags: ubuntu=20.04{kernel:5.8.0-*} Download URL: https://raw.githubusercontent.com/google/security-research/master/pocs/linux/cve-2021-22555/exploit.c ext-url: https://raw.githubusercontent.com/bcoles/kernel-exploits/master/CVE-2021-22555/exploit.c Comments: ip_tables kernel module must be loaded
[ Information Gathering - Sensitive Files ] /.bashrc - /etc/skel/.bashrc /serviceaccount - /run/secrets/kubernetes.io/serviceaccount
[ Information Gathering - ASLR ]
[ Information Gathering - Cgroups ] 0::/
|