CDK: Penetration Toolkit for Containers

The CDK contains a collection of penetration open source tools for containers, designed to deliver exploits on vulnerable machines, without any OS dependency.

Comes with useful networking tools and many powerful PoCs / EXPs to help you easily access a K8s cluster.

Specifications

The CDK has three modules:

  1. Evaluate: collect information inside the container to find potential vulnerabilities.
  2. Exploit: for container escaping and exploiting vulnerabilities
  3. Tool: network tools and APIs for TCP/HTTP requests, tunnels and K8s cluster.

Use

cdk evaluate [–full] cdk run (–list | […])
cdk auto-escape
CDK [...]

Evaluate:

cdk evaluate Gather information to find weakness inside container.
cdk evaluate –full Enable file scan during information gathering.

Exploit:

cdk run –list List all available exploits.
cdk run […] Run single exploit, docs in https://github.com/cdk-team/CDK/wiki

Auto Escape:
cdk auto-escape Escape container in different ways then let target execute .

Tools:

vi Edit files in container like “vi” command.
ps Show process information like “ps -ef” command.
nc [options] Create TCP tunnel.

ifconfig Show network information.

kcurl (get|post) Make request to K8s api-.
ucurl (get|post) Make request to docker unix socket.

probe TCP port scan, example: cdk probe 10.0.1.0-255 80,8080-9443 50 1000

Options:

-h –help Show this help msg.
-v –version Show version.

You can download it from here.

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.087 registrants.

Written by Anastasis Vasileiadis

Translations are like women. When they are beautiful they are not faithful and when they are faithful they are not beautiful.

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).