• Stars
    star
    569
  • Rank 78,369 (Top 2 %)
  • Language
    Shell
  • License
    GNU General Publi...
  • Created over 1 year ago
  • Updated 6 months ago

Reviews

There are no reviews yet. Be the first to send feedback to the community and the maintainers!

Repository Details

RedCloudOS is a Cloud Adversary Simulation Operating System for Red Teams to assess the Cloud Security of Leading Cloud Service Providers (CSPs)

RedCloud OS

Logo

Intro

RedCloud OS is a Debian based Cloud Adversary Simulation Operating System for Red Teams to assess the security of leading Cloud Service Providers (CSPs). It includes tools optimized for adversary simulation tasks within Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform (GCP).

Credentials

Username --> cwl

Password --> redcloud

Specs

Platform --> VMware Workstation [VMware player can also work, although we have not tested yet]

RAM --> 8GB+ recommended; 4GB Minimum

No. of cores --> 4+ Cores recommended; 2 Minimum

Getting Started with Cloud Red Team PDF --> Getting Started with Cloud Red Team PDF

Available Tools

AWS

Azure

GCP

Multi Cloud

Getting Started

Download

  • Step 1 --> Download the zip archive from here
  • Step 2 --> Unzip the archive
  • Step 3 --> Open VMware Workstation > File > Open (Ctrl + O) > Browse to extracted folder and select RedCloud OS.ovf
  • Step 4 --> Click Import

Usage

The OS setup is simple and tools are divided by the CSPs. Inside each CSP, there are three sub-categories i.e, Enumeration, Exploitation, and Post Exploitation. For multitasking and ease-of-use, Terminator is set as the default terminal.

Each tool can be launched in 4 different ways as follows:-

  1. By clicking their menu launchers
  2. Directly executing startup.sh script in respective /opt/ folder
  3. Executing startup script in /usr/local/bin
  4. TAB autocomplete to search binary using tool name

Note: PowerShell tools start with capital letters and all others start with small letters. In case of any confusion, feel free to checkout /usr/local/bin.

That being said, there are some launchers like Impacket and Redboto which due to lots of scripts are only listing the scripts and folder path. In the next release, we'll be including proper launchers for these as well as as for any similar tool.

Environmental Variables Setup

We have provided some examples of environmental variables required for certain tools to work. These variables however are not exhaustive and more can be needed on case-to-case basis.

AWS
export AWS_ACCESS_KEY_ID=<access_key_id>
export AWS_SECRET_ACCESS_KEY=<access_key>
export AWS_DEFAULT_REGION=<region>
Azure
export AZURE_CLIENT_ID = <app-id>
export AZURE_TENANT_ID = <tenant-id>
export AZURE_CLIENT_SECRET = <app-secret>
GCP
export GOOGLE_APPLICATION_CREDENTIALS = <Service Account Json File Path>

Aliases

During the development procedure, few aliases were used for the sake of convenience. These aliases are still in the user account and can be used.

alias c='clear'
alias a='nano ~/.bash_aliases'
alias s='source ~/.bash_aliases'
alias v='python3 -m venv venv && source venv/bin/activate'
alias d='deactivate'
alias p='pip3 install -r requirements.txt'
alias ll='ls -la'

Building from scratch

  1. Download base OS i.e, Parrot OS Architect Edition 5.3 and proceed with installation in VMware/VirtualBox.
  2. During VM installation, when prompted to choose components, select only Mate Desktop Environment and proceed.
  3. Once installation is finished, launch VM and clone this repo using git clone https://github.com/RedTeamOperations/RedCloud-OS.git
  4. Browse to build-scripts folder and make scripts executable.
  5. First execute uninstall.sh and wait for script to finish.
  6. Then execute hold.sh and wait for script to finish.
  7. Finally execute install.sh and wait for script to finish.
  8. Install required tools from APT repo/Github/Gitlab.
  9. Use Menu Editor to create applications launchers.
  10. Use Dconf-Editor to customize icons.
  11. Use Grub Customizer to modify Grub settings.

Cheatsheets

Below are the links of couple cheatsheets related to TTPs of cloud security assessments. Please note that these links are given for reference purposes only and might not cover everything. If you feel like you have something to contribute in regards of TTPs, please refer to their respective contributing pages.

  1. Hacktricks Cloud
  2. Offensive Cloud

Feedback

RedCloud OS is an ongoing piece of development and your feedbacks/suggestions will help us enhance it furthermore. Feel free to either create an Issue or email us at [email protected] with the subject "RedCloud OS".

Acknowledgements

  • Parrot Security for providing the Base OS
  • Creators/Developers/Contributors/Maintainers of all Open Source Components used within RedCloud OS