How attackers use exposed Prometheus server to exploit Kubernetes clusters

This page summarizes the projects mentioned and recommended in the original post on dev.to

InfluxDB - Power Real-Time Data Analytics at Scale
Get real-time insights from all types of time series data with InfluxDB. Ingest, query, and analyze billions of data points in real-time with unbounded cardinality.
www.influxdata.com
featured
SaaSHub - Software Alternatives and Reviews
SaaSHub helps you find the best software and product alternatives
www.saashub.com
featured
  • juice-shop

    OWASP Juice Shop: Probably the most modern and sophisticated insecure web application

  • Exposed Prometheus metrics Endpoint

  • deep-confusables-cli

    Discontinued DeepConfusables generates new variations of an input based on similarity matrix generated by deep-confusables-similarity.

  • Official/private registration: In this case, the attacker could use similar image names, such as homographs, visually similar by using different Unicode groups, to trick the target. Another technique could be to abuse an insider to manually change the exposed image. In this case, it depends on the financial gain of the attacker.

  • InfluxDB

    Power Real-Time Data Analytics at Scale. Get real-time insights from all types of time series data with InfluxDB. Ingest, query, and analyze billions of data points in real-time with unbounded cardinality.

    InfluxDB logo
  • SQLMap

    Automatic SQL injection and database takeover tool

  • In the first scenario, the exposed application is running on a Kubernetes cluster and the attacker wants to access the data without authorization. The first thing the attacker could check is if the application can be exploited through normal pentesting techniques, for example, with SQLmap the attacker can try to gain access to the data.

  • prometheus

    The Prometheus monitoring system and time series database.

  • Prometheus is the de facto monitoring standard in Kubernetes. All the Kubernetes components of the control plane generate Prometheus metrics out of the box, and many Kubernetes distributions come with Prometheus installed by default including a series of standard exporters, generally:

  • BeEF

    The Browser Exploitation Framework Project

  • Third-party registry: In this case, one of the methods could be social engineering, using tools like BeeF to create a specific phishing or fake page to get the login credentials and change the image to a new one with a known and exploitable vulnerability and wait for the deployment. One more thing is this is not magic or 100% successful. If the company scans the images in the deployment, it could be detected!

  • SaaSHub

    SaaSHub - Software Alternatives and Reviews. SaaSHub helps you find the best software and product alternatives

    SaaSHub logo
NOTE: The number of mentions on this list indicates mentions on common posts plus user suggested alternatives. Hence, a higher number means a more popular project.

Suggest a related project

Related posts

  • Best Hacking Tools for Beginners 2024

    5 projects | dev.to | 1 Feb 2024
  • PHP in 2023?

    3 projects | /r/PHP | 10 Jul 2023
  • The 36 tools that SaaS can use to keep their product and data safe from criminal hackers (manual research)

    18 projects | /r/SaaS | 22 May 2023
  • Pentesting Tools I Use Everyday

    8 projects | dev.to | 7 Feb 2023
  • Tips for Making a Popular Open-Source Project in 2021 [Ultimate Guide]

    12 projects | news.ycombinator.com | 12 Nov 2021