• Skip to main content
  • Skip to header right navigation
  • Skip to site footer
iGuRu

iGuRu

Real-time Technology News. Opinions & Tweaks

  • / news
  • / infosec
  • / tools
  • / tweaks
  • / dummies
  • / opinions
  • / support
home / tools / CDK: Penetration Toolkit for Containers

CDK: Penetration Toolkit for Containers

22/01/2021 20:10 by Anastasis Vasileiadis

The CDK contains a collection of penetration testing open source tools for containers, designed to deliver exploits to vulnerable machines without any dependency on the operating system.

Comes with useful networking tools and many powerful PoCs / EXPs to help you easily access a K8s cluster.

68747470733a2f2f7374617469632e636478792e6d652f32303230313230333137303330385f4e777a4769545f53637265656e73686f742e6a706567 - CDK: Penetration Toolkit για Containers

Character

The CDK has three modules:

  1. Evaluate: collect information inside the container to find potential vulnerabilities.
  2. Exploit: for container escaping and exploiting vulnerabilities
  3. Tool: network and API tools for TCP / HTTP requests, tunnels and K8s cluster management.

Use

cdk evaluate [–full] cdk run (–list | [ …])
cdk auto-escape
cdk [ …]

Evaluate:

cdk evaluate Gather information to find weakness inside container.
cdk evaluate –full Enable file scan during information gathering.

Exploit:

cdk run –list List all available exploits.
cdk run [ …] Run single exploit, docs in https://github.com/cdk-team/CDK/wiki

Auto Escape:
cdk auto-escape Escape container in different ways then let target execute .

tool:

vi Edit files in container like “vi” command.
ps Show process information like “ps -ef” command.
nc [options] Create TCP tunnel.

ifconfig Show network information.

kcurl (get | post) Make request to K8s api-server.
ucurl (get | post) Make request to docker unix socket.

probe TCP port scan, example: cdk probe 10.0.1.0-255 80,8080-9443 50 1000

Options:

-h –help Show this help msg.
-v –version Show version.

You can download the program from here.

CDK: Penetration Toolkit for Containers was last modified: 22 January, 2021, 8: 10 mm by Anastasis Vasileiadis

Subscribe to our newsletter

no spam

spread the news

  • Facebook
  • Twitter
  • Reddit
  • Printing
  • Email

Read them Technology News from all over the world, with the validity of iGuRu.gr

Follow us on Google News


Competition: toolsDay: penetration, Penetration Toolkit

You May Also Like

Guide to a Successful Phishing Attack
BlueKeep An American company sells the exploit
BlackArch Linux 2018.12.01 with 150 new tools

About Us Anastasis Vasileiadis

Translations are like women. When they are beautiful they are not faithful and when they are faithful they are not beautiful.

Previous Post: « Edge 88.0.705.50 fixes to many security vulnerabilities
Next Post: reconftw: Simple and easy to use Recon script »

Reader Interactions

Comment Policy:

IGuRu.gr does not publish the comments immediately. Malicious comments, comments that include ads, or comments that are offensive are deleted without notice. We do not adopt the opinions expressed by our readers.
Your comments will be displayed after approval by the administrators


Leave your comment
Ακύρωση απάντησης

Your email address is not published. Τα υποχρεωτικά πεδία σημειώνονται με *

 

 © 2021 · iGuRu.gr · ☢ · Keep It Simple Stupid Genesis theme

about  ·   get in touch  ·  rss  ·  sitemap  ·  cough

loadingCancel
Could not post post - check your email address!
Email verification failed, please try again
Your blog can not post posts via email.