Skip to content

KAET logo

Kubernetes Auto Exploit Tool (KAET)

KAET: an automation that analyzes weaknesses in Role-Based Access Controls (RBAC) in Kubernetes Clusters. This tool uses a set of known attacks on misconfigurations and loose permissions in RBAC controls, finding attack paths based on initial access to the cluster.

Kubernetes Clusters have a large number of Roles and Cluster Roles, making it not feasible for humans to test all possible combinations and verify what a malicious actor can do with those permissions. Therefore, we need an automation to perform this evaluation and provide feedback. KAET can do it all! In this case, KAET actively tests all possible attacks, based on initial access inside or outside the cluster.

In that case, based on the initial access, KAET enumerates all current permissions using KAL. Each permission rule uses loose permissions and misconfigurations to exploit the Kubernetes Cluster and its workloads.

Examples of loose permissions are:

  • Reading Secrets of other namespaces
  • A Service Account Token being able to start a new Kubernetes POD from inside the cluster
  • Executing remote commands in other PODs, using the pods/exec resource

Main Features

  • No additional role required to run KAET
  • Self-contained Kubernetes exploitation tool
  • Evaluate Role-Based Access Control (RBAC)
  • Executable in Zero-privileged environments
  • Non-interactive usage
  • Multiple options for customized execution

Contributing

Contributions are more than welcome! Please see our contribution guidelines first.

License

You can check our licensing scheme here.

Tools that Inspired KAET