TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Show HN: Endgame – An AWS Pentesting tool to backdoor or expose AWS resources

368 pointsby kmcquadeover 4 years ago

28 comments

ManWith2Plansover 4 years ago
I work with AWS a lot every day and lead a team responsible for building workloads on AWS for some customers with very high security requirements. This tool terrifies me.<p>The sheer amount of potential for misconfiguration of resources that this tool can exploit with no effort whatsoever is absolutely insane. I feel like every AWS environment I&#x27;ve ever seen is suddenly at risk of some angry employee compromising everything very very quickly.<p>I&#x27;m betting over at AWS they&#x27;re almost as terrified by this as I am.
评论 #26157260 未加载
评论 #26156781 未加载
评论 #26156606 未加载
评论 #26161355 未加载
评论 #26158963 未加载
评论 #26160868 未加载
评论 #26156600 未加载
评论 #26174032 未加载
sodality2over 4 years ago
My first thought was &quot;why is salesforce publishing essentially a hacking tool? why can&#x27;t they bring it up privately, surely a large enough company will have some weight to their request?&quot; but then I remembered AWS...<p>&gt;At the time of this writing, AWS Access Analyzer does NOT support auditing 11 out of the 18 services that Endgame attacks. Given that Access Analyzer is intended to detect this exact kind of violation, we kindly suggest to the AWS Team that they support all resources that can be attacked using Endgame<p>...and it&#x27;s not even a hacking tool!
评论 #26154311 未加载
pachicoover 4 years ago
404? someone got an urgent call from AWS and politely requested to remove it since both companies are supposed to be partners?
评论 #26158325 未加载
评论 #26160134 未加载
评论 #26159165 未加载
评论 #26158836 未加载
booleanbetrayalover 4 years ago
It really seems that AWS cares more about the cadence of shiny new managed solutions than they do about maintaining and upgrading their existing solutions. I wouldn&#x27;t characterize it as willful negligence, quite yet, but some processes are definitely broken.<p>Case in point, in the last week alone, I&#x27;ve discovered a Fargate EKS managed platform upgrade getting botched behind the scenes (unexpected containerd versions, etc), as well as a lack of support out of RDS Proxy for things like the latest stable default Postgres offering (12.5) in RDS. They released 12.0 to the preview channel in November of 2019 ... how long does it take exactly to get support for something like that?<p>All that is to say, I would not be expecting any improvements to AWS Access Analyzer anytime soon, despite this tool&#x27;s debut.
l33tmanover 4 years ago
Note that as far as I could tell, this is a tool to check which unexpected AWS modifications can be done from API keys that you do make public in the first place. It doesn&#x27;t &quot;hack&quot; an account per se.<p>So for example if you&#x27;ve created some IAM API keys and embedded in an app for example, and you (incorrectly) believe the permissions only grant the app to fetch some static media files from an S3 bucket, the tool can discover incorrect configurations that would allow someone who extracted the key to change permissions of the bucket.
评论 #26156159 未加载
评论 #26156144 未加载
评论 #26159047 未加载
bwaineover 4 years ago
It would be nice if this was the other way round :&#x27;&#x27;&#x27;&#x27;&#x27;(<p># this will ruin your day<p>endgame smash --service all --evil-principal &quot;<i>&quot;<p># This will show you how your day could have been ruined<p>endgame smash --service all --evil-principal &quot;</i>&quot; --dry-run<p>Looks like it can be reversed with --undo, but brown trousers time if you groggily run it at 08:30am coffee in hand.
评论 #26154415 未加载
评论 #26154458 未加载
kapilvtover 4 years ago
fwiw the opensource (and cncf incubator project) <a href="https:&#x2F;&#x2F;cloudcustodian.io" rel="nofollow">https:&#x2F;&#x2F;cloudcustodian.io</a> can detect and remediate these modifications to embedded iam policies (across many resource types) in realtime that share beyond an organizations&#x2F;accounts boundaries. its like access analyzer except its flexible enough to understand internal org distinctions (dev&#x2F;prod separation) and allowed access to third parties.
sdfhbdfover 4 years ago
Anybody have a mirror? It seems to have been taken down from GitHub.<p>Also I guess it might have been a not so nice from an almost direct competitor of AWS - salesforce - to publish something like that. Salesforce owns heroku.
评论 #26158226 未加载
评论 #26158437 未加载
评论 #26158237 未加载
nic-wallerover 4 years ago
Impressive tool, but the supporting documentation is what I appreciate most.<p>I think the prevention guide could be improved by providing an example service control policy that blocks known dangerous IAM actions like ecr:SetRepositoryPolicy for all but a specific security principal.
评论 #26154682 未加载
tbrockover 4 years ago
Can someone explain why you&#x27;d ever want to run this in the non-dryrun mode?<p>I understand that if you have these problems you&#x27;ve already effectively granted those permissions anyway but actually executing them before someone finds them lowers the bar quite a bit for other baddies to attack.
评论 #26157929 未加载
评论 #26157672 未加载
评论 #26156836 未加载
评论 #26158118 未加载
syntheticcorpover 4 years ago
The main repository seems to have been taken down but it is still available at <a href="https:&#x2F;&#x2F;github.com&#x2F;kmcquade&#x2F;endgame" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;kmcquade&#x2F;endgame</a> and on Pypi
评论 #26162805 未加载
评论 #26158534 未加载
评论 #26161317 未加载
sk5tover 4 years ago
So, this is essentially a script to mess up your AWS resource permissions by using a privileged account to an extent that a) might surprise folks who haven&#x27;t thought too deeply on the matter, and b) will be challenging to uncover using AWS&#x27;s own audit facilities, is that fair to say?
sandGorgonover 4 years ago
@kmcquade ur awesome ! we are users of <a href="https:&#x2F;&#x2F;github.com&#x2F;salesforce&#x2F;policy_sentry" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;salesforce&#x2F;policy_sentry</a> and definitely definitely <a href="https:&#x2F;&#x2F;github.com&#x2F;salesforce&#x2F;cloudsplaining" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;salesforce&#x2F;cloudsplaining</a> .<p>If I could give you guys money, I would. You should totally build a startup around it.
评论 #26154783 未加载
vorticalboxover 4 years ago
Does anyone have any ideas as to why this is being taken down? Hacking tools are released all the time. Why did this one make such a big ripple in the pond?
simonebrunozziover 4 years ago
Make sure you check AWS&#x27; pentesting policy [0].<p>[0]: <a href="https:&#x2F;&#x2F;aws.amazon.com&#x2F;security&#x2F;penetration-testing&#x2F;" rel="nofollow">https:&#x2F;&#x2F;aws.amazon.com&#x2F;security&#x2F;penetration-testing&#x2F;</a>
评论 #26157690 未加载
avi_vallarapuover 4 years ago
It is great that it is Public because as it will create some sense of urgency. Similar to how you expose a Bug on Aurora like following, every such finding will directly&#x2F;indirectly help a user in making good decisions and understand how to be careful.<p><a href="https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=26146440" rel="nofollow">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=26146440</a>
crankyoldnerdover 4 years ago
<a href="https:&#x2F;&#x2F;github.com&#x2F;brandongalbraith&#x2F;endgame" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;brandongalbraith&#x2F;endgame</a> still has it as of this morning, the several I marked last night waiting to ask at work about it have disappeared, so dunno how long this one will be tehre.
sub7over 4 years ago
lol you&#x27;re about to get a giant offer from Amazon. Tell them you want 10x whatever they first offer and they&#x27;ll say yes.
评论 #26161622 未加载
Mandatumover 4 years ago
Archived version: <a href="https:&#x2F;&#x2F;web.archive.org&#x2F;web&#x2F;20210216140035&#x2F;https:&#x2F;&#x2F;github.com&#x2F;salesforce&#x2F;endgame" rel="nofollow">https:&#x2F;&#x2F;web.archive.org&#x2F;web&#x2F;20210216140035&#x2F;https:&#x2F;&#x2F;github.co...</a>
yevpatsover 4 years ago
Cool. Another tool in the space - <a href="https:&#x2F;&#x2F;github.com&#x2F;cloudquery&#x2F;cloudquery" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;cloudquery&#x2F;cloudquery</a> open-source framework to ask questions about your cloud infrastructure with SQL.
hrezover 4 years ago
Except it&#x27;s not &quot;Pentesting tool to backdoor&quot; anything. It&#x27;s simply modifying an access given you already have credentials to do that. You can do the same with aws cli (oh horror &#x2F;s).
robblbobblover 4 years ago
404 now
arkwinover 4 years ago
It&#x27;s gone now. :( I should have cloned it, anyone have a clone?
评论 #26158380 未加载
pachicoover 4 years ago
We use both AWS and Salesforce and I&#x27;m surprised about this tool being developed by SF after all the whistle and bells about the partnership between the two.
mikesabbaghover 4 years ago
nothing of security threat I guess. It uses your permissions, to modify the current permissions for different product. If u do have permissions to modify things, then this will work. if you have no permissions, it will fail.<p>So can it be used with bad intention, yes. But if I am a hacker, would i want to open all the available doors? or choose 1 or 2 doors only instead and keep the rest as is!!
procrastinatusover 4 years ago
Do analogous tools exist for GCP and Azure?
评论 #26154595 未加载
评论 #26158389 未加载
jarymover 4 years ago
Something tells me this is not AWS specific - how do GCP&#x2F;Azure&#x2F;Heroku stack up in comparison?
评论 #26158232 未加载
idclipover 4 years ago
Seems to have been taken down. A shame id have enjoyed reading that code
评论 #26176328 未加载