GKE Auditor – Detect Google Kubernetes Engine Misconfigurations


GKE Auditor is a Java-based tool to detect Google Kubernetes Engine misconfigurations, it aims to help security and development teams streamline the configuration process and save time looking for generic bugs and vulnerabilities.

GKE Auditor - Detect Google Kubernetes Engine Misconfigurations


The tool consists of individual modules called Detectors, each scanning for a specific vulnerability.

Installing and Using GKE Auditor to Detect Google Kubernetes Engine Misconfigurations

Installation

Usage

The tool has to be built by running the build.sh script first.

Once the tool is built, it can be run using the auditor.sh script, using the following options:

General Detector Output Format for GKE Auditor

  • Detector: Detector name
  • Explanation: A short explanation of the concept that is being checked. Describes how and why the concept be a security issue. Often includes links to the documentation for more information.
  • Remediation: Steps to take in order to review the problem and resolve the vulnerability.
  • Useful links: Links to the documentation or other resources where the customer can learn about the issues at hand.
  • Level: one of [VULNERABILITY, WARNING]. VULNERABILITY implies security recommendations are not being followed, whereas a WARNING is informational and implies a potential vulnerability could exist.
  • Severity: one of [LOW, MEDIUM, HIGH]. Indicator of the seriousness of detected issues.
  • Vulnerable assets: List of assets that have the above-described vulnerability.
  • You can download GKE Auditor here:

    gke-auditor-master.zip

    Or read more here.


    Topic: Countermeasures

    zANTI – Android Wireless Hacking Tool Free Download


    zANTI is an Android Wireless Hacking Tool that functions as a mobile penetration testing toolkit that lets you assess the risk level of a network using your mobile device for free download.

    zANTI - Android Wireless Hacking Tool Free Download


    This easy to use mobile toolkit enables IT Security Administrators to simulate an advanced attacker to identify the malicious techniques they use in the wild to compromise the corporate network.

    Features of zANTI Android Wireless Hacking Tool

    This network auditor comes along with a rather simple interface compared to other solutions and running its tasks is pretty straightforward. These are its main features:

    Scan
    Conduct network scans, in different intensity levels in order to identify connected devices, their properties and their vulnerabilities.

    Diagnose

    Enable Security Officers to easily evaluate an organization’s network and automatically diagnose vulnerabilities within mobile devices or web sites using a host of penetration tests including, man-in-the-Middle (MITM), password cracking and Metasploit.

    Report

    Highlight security gaps in your existing network and mobile defences and report the results with advanced cloud-based reporting through zConsole. zANTI mirrors the methods a cyber-attacker can use to identify security holes within your network. Dash-board reporting enables businesses to see the risks and take appropriate corrective actions to fix critical security issues.

    Installing zANTI Android Wireless Hacking Tool

    Minimum operating system requirements: Android 4.0.
    The installation of the app by means of the APK file requires the activation of the “Unknown sources” option within Settings>Applications.

    You can download zANTI here – the password is darknet123!

    zAnti3.19.apk.zip

    Or read more here.


    Topic: Hacking Tools

    HELK – Open Source Threat Hunting Platform


    The Hunting ELK or simply the HELK is an Open-Source Threat Hunting Platform with advanced analytics capabilities such as SQL declarative language, graphing, structured streaming, and even machine learning via Jupyter notebooks and Apache Spark over an ELK stack.

    HELK - Open Source Threat Hunting Platform


    This project was developed primarily for research, but due to its flexible design and core components, it can be deployed in larger environments with the right configurations and scalable infrastructure.

    Goals of HELK Open Source Threat Hunting Platform

    • Provide an open-source hunting platform to the community and share the basics of Threat Hunting.
    • Expedite the time it takes to deploy a hunting platform.
    • Improve the testing and development of hunting use cases in an easier and more affordable way.
    • Enable Data Science capabilities while analyzing data via Apache Spark, GraphFrames & Jupyter Notebooks.

    Installing HELK Open Source Threat Hunting Platform

    You can start playing with the HELK in a few steps:

    Step 1, download:

    Step 2, install:

    You can download HELK here:

    HELK-v0.1.7-alpha03042019.zip

    Or read more here.


    Topic: Hacking Tools

    Trape – OSINT Analysis Tool For People Tracking


    Trape is an OSINT analysis tool, which allows people to track and execute intelligent social engineering attacks in real-time. It was created with the aim of teaching the world how large Internet companies could obtain confidential information.

    trape - OSINT Analysis Tool For People Tracking


    Example types of information are the status of sessions of their websites or services and control their users through their browser, without their knowledge. It has evolved with the aim of helping government organizations, companies and researchers to track the cybercriminals.

    How to use Trape OSINT Analysis Tool

    Install Trape OSINT Analysis Tool

    First download the tool:

    If it does not work, try to install all the libraries that are located in the file requirements.txt

    Example execution:

    You can download Trape here:

    trape-master.zip

    Or read more here.


    Topic: Social Engineering
    Fuzzilli - JavaScript Engine Fuzzing Library

    Fuzzilli – JavaScript Engine Fuzzing Library

    Fuzzilii is a JavaScript engine fuzzing library, it’s a coverage-guided fuzzer for dynamic language interpreters based on a custom intermediate language (“FuzzIL”) which can be mutated and translated to JavaScript. When fuzzing for core interpreter bugs, e.g. in JIT compilers, semantic correctness of generated programs becomes a concern. This is in contrast to most other […]

    Topic: Exploits/Vulnerabilities
    OWASP APICheck - HTTP API DevSecOps Toolset

    OWASP APICheck – HTTP API DevSecOps Toolset

    APICheck is an HTTP API DevSecOps toolset, it integrates existing HTTP APIs tools, creates execution chains easily and is designed for integration with third-party tools in mind. APICheck is comprised of a set of tools that can be connected to each other to achieve different functionalities, depending on how they are connected. It allows you […]

    Topic: Security Software