• Stars
    star
    131
  • Rank 274,269 (Top 6 %)
  • Language HCL
  • Created about 4 years ago
  • Updated over 3 years ago

Reviews

There are no reviews yet. Be the first to send feedback to the community and the maintainers!

Repository Details

A Docker container for remote penetration testing.

Aria Cloud Overview

Aria Cloud Penetration Testing Tools Container. Aria Cloud is a Docker Container ideal for remote pentesting over SSH or RDP, with a primary emphasis on cloud security tools and secondary on Active Directory tools. Use it for an assumed breach pentest where remote access is necessary via RDP or SSH, or for simple AD lab testing. It is built for use cases where one needs to remote into a container using SSH or RDP, and then run their security workflows (i.e., Cloud environments). This repo also included an automated Terraform template + Ansible Playbook to deploy Aria Cloud as a container running on an Ubuntu Linux VM, with remote access over RDP.

Medium Blog: https://medium.com/bugbountywriteup/pentesting-in-the-clouds-introducing-ariacloud-58cb5cc1c50d

Summary of Tools (Image Built on Kali Linux Rolling)

Terraform Automated Deployment

This repo now includes a Terraform template and Ansible Playbook that automatically deploys Aria Cloud into an Azure VM with remote access over RDP. For more information, navigate into the terraform-azure directory and see the README.

Default Credentials

Username: aria

Password: !aria123!

Default Tools Directory Most special tools are installed into /opt directory if they aren't in the default /usr/local/bin/ path

3 Docker Containers: 3 Potential Use Cases

Use Case #1: aria-base: Attach to /bin/bash local console, and do your thing.

Use Case #2: aria-rdp: Use an RDP client to remotely access the container. Best for running Bloodhound and other tools that require Neo4j GUI.

Use Case #3: aria-ssh: Use an SSH client to remotely access the container.

Base Image Use Case: Build or Pull, and then Run

Pre-requisite: Install docker for your system

Quickly run it with docker pull:

docker pull iknowjason/aria-base:latest

Run it!

docker run -ti iknowjason/aria-base:latest

You can get the IMAGE_ID with docker images command

Build & Run It

Clone this repo:

git clone https://github.com/iknowjason/AriaCloud.git
cd AriaCloud

Build:

docker build -f Dockerfile.base -t aria .

Run:

docker run -ti aria

RDP Container Use Case: Build or Pull, and then Run

Quickly run it with docker pull:

docker pull iknowjason/aria-rdp:latest

Bind the RDP ports from the docker container to expose them on the LAN interface of the host computer

docker run -d --name myname -p 3389:3389 iknowjason/aria-rdp:latest

You can get the IMAGE_ID with docker images command

Verify ports:

docker port myname

Now RDP to your Host computer's IP address on port 3389.

Build & Run It

Clone this repo:

git clone https://github.com/iknowjason/AriaCloud.git
cd AriaCloud

Build:

docker build -f Dockerfile.rdp -t aria .

Run:

docker run -d --name myname -p 3389:3389 aria

SSH Container Use Case: Build or Pull, and then Run

Quickly run it with docker pull:

docker pull iknowjason/aria-ssh:latest

Bind the SSH ports from the docker container to expose them on the LAN interface of the host computer

docker run -d --name myname -p 22:22 iknowjason/aria-ssh:latest

You can get the IMAGE_ID with docker images command

Verify ports:

docker port myname

Now SSH to your Host computer's IP address on port 22.

Build & Run It

Clone this repo:

git clone https://github.com/iknowjason/AriaCloud.git
cd AriaCloud

Build:

docker build -f Dockerfile.ssh -t aria .

Run:

docker run -d --name myname -p 22:22 aria

To Do

  • Fix small errors after RDP connection and auth success
  • Fix MacOS RDP client black screen
  • Terraform template deployment for AWS
  • K8s tools

Hat Tips

  • Offensive Security team for Kali
  • All the other tool authors listed above

More Repositories

1

Awesome-CloudSec-Labs

Awesome free cloud native security learning labs. Includes CTF, self-hosted workshops, guided vulnerability labs, and research labs.
1,321
star
2

PurpleCloud

A little tool to play with Azure Identity - Azure Active Directory lab creation tool
Python
485
star
3

edge

Recon tool for cloud provider attribution. Supports AWS, Azure, Google, Cloudflare, and Digital Ocean.
Go
150
star
4

AutomatedEmulation

An automated Breach and Attack Simulation lab with terraform. Built for IaC stability, consistency, and speed.
HCL
145
star
5

BlueCloud

Cyber Range including Velociraptor + HELK system with a Windows VM for security testing and R&D. Azure and AWS terraform support.
HTML
122
star
6

voiphopper

VoIP Hopper Network Penetration Testing Tool - Jumping from one VLAN to the next! A network infrastructure penetration testing security tool. A tool to test for the (in)security of VLANS. It can mimic the behavior of IP Phones to better understand business risks within an IP Telephony network infrastructure. VoIP Hopper is included in Kali Linux. This site is for up-to-date code. Documentation website:
Roff
63
star
7

Velociraptor_Azure

A collection of Terraform and Ansible scripts that automatically (and quickly) deploys a small Velociraptor R&D lab.
HCL
20
star
8

hammer

An example of a mis-configured Rails application release under MIT license.
Ruby
18
star
9

masscan_nmap

Automating masscan and nmap together.
Python
10
star
10

CMLab

Configuration Management (CM) Security Playground. A small enterprise security lab to practice automation + CM tooling like Ansible, Chef, Puppet, DSCv2, DSCv3, SaltStack.
HCL
9
star
11

azrecon

Az Enum & Recon Cheat Sheet
Shell
6
star
12

MacLab

Multi-use Terraform template to quickly spin up a Mac Lab in AWS!
HCL
6
star
13

conferences

Community contributions to SANS, DEFCON, ShmooCon, and ToorCon.
3
star
14

BlueTools

3
star
15

nmap_nse

Some nmap NSE scripts for testing web applications for sensitive credentials and API keys that can sometimes be inadvertently exposed through environment variables or other mis-configurations.
Lua
3
star
16

HELK_Azure

A collection of Terraform and Ansible scripts that automatically (and quickly) deploys a small HELK R&D lab in Azure.
HCL
2
star
17

spb

Shortest Path Bridging (SPB-Mac) vulnerability testing scripts. Used in a network pentest to enumerate a new vuln (CVE-2016-2783) in Avaya VOSS Ethernet switches.
Python
1
star
18

for608-dev

Shell
1
star
19

sniffm

VoIP Sniffer for MGCP protocol
Python
1
star