git clone https://github.com/redhuntlabs/KubeStalk.git
python3 -m pip install requests
python3 -m pip install -r requirements.txt
$ python3 kubestalk.py -h
+---------------------+
| K U B E S T A L K |
+---------------------+ v0.1
[!] KubeStalk by RedHunt Labs - A Modern Attack Surface (ASM) Management Company
[!] Author: 0xInfection (RHL Research Team)
[!] Continuously Track Your Attack Surface using https://redhuntlabs.com/nvadr.
usage: ./kubestalk.py <url(s)>/<cidr>
Required Arguments:
urls 待扫描的主机地址列表
Optional Arguments:
-o OUTPUT, --output OUTPUT
将路径输出写入到CSV文件中
-f SIG_FILE, --sig-dir SIG_FILE
要加载的签名目录路径
-t TIMEOUT, --timeout TIMEOUT
HTTP超时值(单位为秒)
-ua USER_AGENT, --user-agent USER_AGENT
HTTP请求中要设置的用户代理Header
--concurrency CONCURRENCY
同时需要处理的主机数量
--verify-ssl 验证SSL证书
--version 显示KubeStalk版本并退出
(向右滑动,查看更多)
$ python3 kubestalk.py https://███.██.██.███:10250
+---------------------+
| K U B E S T A L K |
+---------------------+ v0.1
[!] KubeStalk by RedHunt Labs - A Modern Attack Surface (ASM) Management Company
[!] Author: 0xInfection (RHL Research Team)
[!] Continuously Track Your Attack Surface using https://redhuntlabs.com/nvadr.
[+] Loaded 10 signatures to scan.
[*] Processing host: https://███.██.██.██:10250
[!] Found potential issue on https://███.██.██.██:10250: Kubernetes Pod List Exposure
[*] Writing results to output file.
[+] Done.
https://redhuntlabs.com/blog/unsecured-kubernetes-clusters-exposed/
https://redhuntlabs.com/nvadr