Skip to content

Latest commit

 

History

History
29 lines (21 loc) · 1.25 KB

README.md

File metadata and controls

29 lines (21 loc) · 1.25 KB

PAZUZU: Portainer Authentication Zap Using Zero Utilities

Pazuzu is a ruby exploit for vulnerable Portainer instances (those running with the --no-auth switch by default. When tested, Pazuzu found 300+ vulnerable containers among many instances. All of them hosted government related information, and are already patched. It is named after the main antagonist on The Exorcist.

PAZUZU was featured @ DevFest Siberia 2018 by its original author (Mauro Cáseres / Mauro Eldritch).

#Run with STARTING_IP and ENDING_IP as arguments:

./pazuzu.rb 192.168.0.1 192.168.0.10

When running on daemon mode (-d) [yeah, I said daemon, really original], PAZUZU will spawn a local vulnerable instance for testing purposes.

#Get a local vulnerable instance

./pazuzu.rb -d

Pazuzu comes bundled with Exorcist (Previously, Karras), a special tool meant to destroy Pazuzu's devilish containers. Invoke it to safely get rid of them and clean your system. It is the only recommended way, as it cleans the messy volumes used by Portainer.

#Back to hell!

./exorcist.rb
# Date Conference Link to Video Link to Slides
1 NOV-2018 DEVFEST Siberia TBA https://drive.google.com/open?id=1uXFrLTIIdrypM4ECQxIYF1dz2iVf1OG6w09eB_KkFnA