Skip to content

PAZUZU (Portainer Authentication Zap Using Zero Utilities) is a ruby exploit for vulnerable Portainer instances (--no-auth). Featured @ DevFest Siberia 2018.

MauroEldritch/PAZUZU

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

3 Commits
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

PAZUZU: Portainer Authentication Zap Using Zero Utilities

Pazuzu is a ruby exploit for vulnerable Portainer instances (those running with the --no-auth switch by default. When tested, Pazuzu found 300+ vulnerable containers among many instances. All of them hosted government related information, and are already patched. It is named after the main antagonist on The Exorcist.

PAZUZU was featured @ DevFest Siberia 2018 by its original author (Mauro Cáseres / Mauro Eldritch).

#Run with STARTING_IP and ENDING_IP as arguments:

./pazuzu.rb 192.168.0.1 192.168.0.10

When running on daemon mode (-d) [yeah, I said daemon, really original], PAZUZU will spawn a local vulnerable instance for testing purposes.

#Get a local vulnerable instance

./pazuzu.rb -d

Pazuzu comes bundled with Exorcist (Previously, Karras), a special tool meant to destroy Pazuzu's devilish containers. Invoke it to safely get rid of them and clean your system. It is the only recommended way, as it cleans the messy volumes used by Portainer.

#Back to hell!

./exorcist.rb
# Date Conference Link to Video Link to Slides
1 NOV-2018 DEVFEST Siberia TBA https://drive.google.com/open?id=1uXFrLTIIdrypM4ECQxIYF1dz2iVf1OG6w09eB_KkFnA

About

PAZUZU (Portainer Authentication Zap Using Zero Utilities) is a ruby exploit for vulnerable Portainer instances (--no-auth). Featured @ DevFest Siberia 2018.

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published