Skip to main content

Jenganizer is a tool to map hidden services in AWS. It does this by following the triggered events of a user's actions. When a user performs an action in AWS, it can trigger other events in other services. By following these events, users can identify services that are indirectly deployed by their actions. This can be important, as these resources can present security risks which should be managed and controlled.

Project description

Jenganizer - Hidden Service Revealer for AWS

Jenganizer is a tool to map hidden services in AWS. It does this by following the triggered events of a user's actions. When a user performs an action in AWS, it can trigger other events in other services. By following these events, users can identify services that are indirectly deployed by their actions. This can be important, as these resources can present security risks which should be managed and controlled.

Installation

Install

You can install the package from pypi.org

pip install jenganizer

Usage

jenganizer --help
Usage: jenganizer [OPTIONS]

Options:
  --username TEXT      The username to filter events by  [required]
  --profile-name TEXT  The AWS profile name to use
  --region-name TEXT   The AWS region name to use
  --time-start TEXT    The start time for the event filter, format: YYYY-MM-DD
                       HH:MM:SS+00:00
  --time-end TEXT      The end time for the event filter, format: YYYY-MM-DD
                       HH:MM:SS+00:00
  --time-span TEXT     The time span, in minutes, to filter, going back from
                       now (use this instead of time_start and time_end)
  -d, --depth INTEGER  The depth of triggered events to follow. Depth=0: only
                       initial calls by the user, Depth=1: initial calls and
                       calls triggered by the initial calls, etc.
  -o, --output TEXT    The output file to write the triggered events to
  -v, --verbosity LVL  Either CRITICAL, ERROR, WARNING, INFO or DEBUG
  --help               Show this message and exit.


The way to map hidden services is to perform the initial call to the service with a specific user for the action you want to map, jenganizer will then follow the triggered events to find the resource indirectly deployed to other services.

In order to zoom in on the right events, you can use the --time-start and --time-end, or --time-span.

The depth parameter

The --depth parameter is used to specify how many levels of triggered events to follow. Level 0 only looks at events called directly from the user, level 1 looks at events called by the user and events called by the services used by those events. Such an examination naturally highlights some false positive, so it is important to verify the results.

Results

The results are printed to the console as a list of events, and a file (default name: triggered_events.json) is written with the full events. These events can be used to identify hidden services in AWS.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

jenganizer-0.1.1.tar.gz (9.1 kB view details)

Uploaded Source

File details

Details for the file jenganizer-0.1.1.tar.gz.

File metadata

  • Download URL: jenganizer-0.1.1.tar.gz
  • Upload date:
  • Size: 9.1 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/5.1.1 CPython/3.12.4

File hashes

Hashes for jenganizer-0.1.1.tar.gz
Algorithm Hash digest
SHA256 4e8670a10a9998d0d4c0f5f641fdc07f61ec1bcd1cc1da7cb09e7c220f950143
MD5 e60aca21d27ef83dd1fe77a811808c76
BLAKE2b-256 494d7c42e41633ec3b6b364183c7a29c2875419f6227f9cd3c2403fc01d42136

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page