LowOrbitSec Profile Banner
Low Orbit Security Profile
Low Orbit Security

@LowOrbitSec

Followers
383
Following
34
Media
33
Statuses
79

Tailored Security Solutions from @grahamhelton3

Virginia
Joined February 2023
Don't wanna be here? Send us removal request.
@LowOrbitSec
Low Orbit Security
8 months
Happy new year! Gubble is out now!. Gubble is a tool that queries the Workspace API to analyze Group permissions to identify potential security risks, allowing both offensive and defensive teams to programmatically identify risky permissions. PoCs: 🧵.
Tweet card summary image
github.com
gubble is a tool designed to audit Google Workspace group settings. It analyzes settings such as who can join, view membership, post messages, view conversations, and more to help identify potentia...
2
12
49
@LowOrbitSec
Low Orbit Security
6 months
RT @GrahamHelton3: Golden Ticket Attack In Kubernetes? 🤔. A new post exploitation & persistence tool for Kubernetes just came out called Ku….
0
91
0
@grok
Grok
6 days
What do you want to know?.
449
285
2K
@LowOrbitSec
Low Orbit Security
6 months
RT @GrahamHelton3: You can also do this without being in the pod itself.
Tweet media one
0
3
0
@LowOrbitSec
Low Orbit Security
6 months
The openssl binary is present in many containers images such as:.- go.- haproxy.- kong.- nginx.- php.- rabbitmq.etc. Combined with a simple shell script, we can use openssl to scan for hosts using this crazy oneliner you can find at this github gist: .
Tweet card summary image
gist.github.com
GitHub Gist: instantly share code, notes, and snippets.
0
1
3
@LowOrbitSec
Low Orbit Security
6 months
Scan an IP range using openSSL 🧐. When working in containers, you're operating in a very minimal environment. Often you do not have the traditional tools you need, network discovery tools being one of them.
Tweet media one
1
0
22
@LowOrbitSec
Low Orbit Security
6 months
An example: RBAC is well understood to be a core pillar of kubernetes security, but it's not always implemented in a way that would stop an attacker. Kubernetes security can be hard, but ignoring it will present challenges that can threaten your business.
0
0
3
@LowOrbitSec
Low Orbit Security
6 months
We can't begin to talk about the more advanced challenges like implementing least privilege, multi tenancy, or implementing defense in depth when we're still attempting to implement the basics.
1
0
3
@LowOrbitSec
Low Orbit Security
6 months
Over the last couple years I've noticed a disturbing trend: . There are not enough offensive security professionals translating well known Kubernetes security principles to the business by demonstrating their impact of not adhering to these security principals.
1
0
2
@LowOrbitSec
Low Orbit Security
6 months
The core of Low Orbit Security are these three words: Show Not Tell. This is what drives my recent focus on Kubernetes security.
Tweet media one
1
1
10
@LowOrbitSec
Low Orbit Security
7 months
RT @GrahamHelton3: 🚨 Reminder! I'll be opening at the @RedTeamVillage_ conference tomorrow (February 8th) at 10AM EST with ~2 hours of li….
0
1
0
@LowOrbitSec
Low Orbit Security
7 months
6. If you want to read more about what happened after the attack, you can read the full report here. A turf war for control over the Kubernetes cluster ensued with multiple threat actors fighting for control of the cluster. It's a fun read!.
Tweet card summary image
crowdstrike.com
The Dero cryptojacking operation locates Kubernetes clusters with anonymous access enabled on a Kubernetes API and listens on non-standard ports accessible from the internet.
0
0
2
@LowOrbitSec
Low Orbit Security
7 months
5. With these permissions, any number of nefarious shenanigans could have been pulled. Once the DaemonSet was deployed, it started the cryptomining software. A lackluster attack for such a powerful position inside a cluster, but a common one.
1
0
2
@LowOrbitSec
Low Orbit Security
7 months
4. In this case, according to the crowdstrike report, the attacker had permissions to deploy a DaemonSet. This is a powerful permission that allows admins (or attackers) to run a copy of a pod on nodes in the cluster. This is what the actual DaemonSet manifest looked like:
Tweet media one
1
0
2
@LowOrbitSec
Low Orbit Security
7 months
3. This means you're removing the authentication step (pictured below), typically relying on authorization and admission control to deny requests. RBAC is tricky to get right every time and fine tuned admission control requires lots of time/effort to get perfect.
Tweet media one
1
0
3
@LowOrbitSec
Low Orbit Security
7 months
2. If a request is not authenticated (IE: it does not present a certificate signed by the kubernetes API server or similar), it will by default be assigned the system:anonymous/system:unauthenticated user/group.
Tweet media one
1
0
2
@LowOrbitSec
Low Orbit Security
7 months
1. The Kubernetes cluster had --anonymous-auth=true (or rather, the cluster didn't have --anonymous-auth=false) in their apiserver manifest. This is default in clusters setup in kubeadm, but what does this mean? Notice how there is no flag setting anonymous auth to false.
Tweet media one
1
0
3
@LowOrbitSec
Low Orbit Security
7 months
Breaking down a real threat actor's TTPs for attacking a Kubernetes cluster 🧵. In march of 2023, Crowdstrike published a report which detailed how an attacker targeted a vulnerable Kubernetes cluster to mine Deno. Here is a break down of how it happened.
Tweet media one
1
2
12
@LowOrbitSec
Low Orbit Security
7 months
If you enjoy these weekly posts, consider subscribing so you get the emails straight to your Inbox and don't have to hope you catch them on your timeline. You can do so here:.
Tweet card summary image
loworbitsecurity.com
A shorter post this week for reasons that will become obvious in the near future. Show Not Tell Lately, I've been putting a lot of thought into offensive security. There are so many useful areas of...
0
0
3
@LowOrbitSec
Low Orbit Security
7 months
Offensive security shouldn't really exist. However, it does (and is impactful) because company's are run by humans who unknowingly operate under the "Show Not Tell" mentality. You can read more of my thoughts on this topic here:.
Tweet card summary image
loworbitsecurity.com
A shorter post this week for reasons that will become obvious in the near future. Show Not Tell Lately, I've been putting a lot of thought into offensive security. There are so many useful areas of...
1
2
15
@LowOrbitSec
Low Orbit Security
7 months
Very interesting data from @wiz_io , excited for the full report. TLDR; Attackers are scanning for exposed Kubernetes clusters and Pods are being deployed in a more secure manner. Of note: 21% of Pods having Critical vulnerabilities is terrifying.
@wiz_io
Wiz
7 months
🚨Newly deployed #Kubernetes clusters are under attack within just 18 minutes. Malicious actors waste no time probing for weaknesses in your setup.
Tweet media one
0
0
3
@LowOrbitSec
Low Orbit Security
7 months
RT @RedTeamVillage_: 📢 Save the Date!. RTV Overflow: A full-day virtual event packed with your favorite workshops! 🚀.📅 Date: Feb 8, 2025.⏰….
0
8
0