Cloud Container Attack Tool (CCAT)

Cloud Container Attack Tool (CCAT)

#Network & Cloud#Cloud Security

Azucar is a multi-threaded plugin-based tool for assessing Azure Cloud security.

Visit Website

Cloud Container Attack Tool (CCAT) - A Security Testing Tool for Container Environments

The Cloud Container Attack Tool (CCAT) is designed for testing the security of container environments. Quick Reference: Where to get help: Join the Pacu/CloudGoat/CCAT Community on Slack, or visit Stack Overflow for assistance. Where to report issues: You can file issues at https://github.com/RhinoSecurityLabs/ccat/issues. Maintained by: The Rhino Assessment Team. Requirements: You need Python version 3.5 or higher. Docker is also required. Note: CCAT has been tested with Docker Engine version 19.03.1. A named profile is necessary to utilize AWS functionality. Additionally, a service account or access token is required for using GCP functionality.

Installation Instructions for CCAT

Installation: We recommend using the provided Docker image to run CCAT. This approach will help you avoid any issues with the necessary dependencies on your own system. To install CCAT from source, follow these commands: $ git clone https://github.com/RhinoSecurityLabs/ccat.git $ cd ccat $ python3 setup.py install $ python3 ccat.py. Using CCAT's Docker Image: Warning: Executing this command will mount your local AWS configuration files into the Docker container when it starts.

Access Implications for Users

This means that any user who has access to the container will also have access to the AWS credentials of your host computer. Warning: Executing this command will mount your local Unix environment.