Skip to content

Conversation

@manuelbua
Copy link
Contributor

Provides a way to detect the Linkerd service mesh for Kubernetes (https://linkerd.io/) that can help expand the attack surface (and/or leak the whole delegation table if verbosity is on).

The badrule one works by supplying an invalid delegation table rule and then inspecting the response for known headers and error messages.

The ssrf one tries to reach out to an external server and look for some known headers or the known response: this can be enhanced by issuing internal requests at 169.254.169.254 to try reach for cloud metadata as well.

Let me know if i'm doing it right guys, keep up the good work!

@ehsandeep
Copy link
Member

Hi @manuelbua, really interesting templates and work, thank you for sharing this with everyone and support with regex on other PR as well.

We are also inviting all the contributors to access invite-only Chaos platform, if you are interested please fill the following google form .

@ehsandeep ehsandeep merged commit 7372b16 into projectdiscovery:master Jun 22, 2020
@manuelbua
Copy link
Contributor Author

Thanks @bauthard, the Chaos platform looks awesome and can't wait to join and take a look, thank you very much!

@manuelbua manuelbua deleted the detect-linkerd-service branch June 30, 2020 18:37
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants