How we hacked Distributed Configuration Management Systems

By Francis Alexander , Bharadwaj Machiraju on 24 Mar 2017 @ Insomnihack
πŸ”— Link
We need help to complete this entry! Missing: presentation, Video
I can help!
#security-assessment #application-pentesting #vulnerability-assessment #configuration-management #exploitation #post-exploitation #lateral-movement
Focus Areas: πŸ” Application Security , 🎯 Penetration Testing , πŸ” Vulnerability Management

Abstract

With increase in necessity of distributed applications, coordination and configuration management tools for these classes of applications have popped up. Zookeeper and Consul being one of them are the base to many systems like Hadoop, Kafka, Apache Mesos etc. These systems might pop-up occasionally during penetration tests. The major focus of this research was to find ways to abuse these systems as well as use them for getting deeper access to other systems.

The talk deals with how they came across and exploited different configuration management systems during their pentests.