Skip to main content

AWS attack automation utility

Project description

AWS Attack Automation

Timberlake is an AWS attack automation utility that can execute one or more test cases. You can read the release blog here: link

Test cases are individual YAML documents that define the setup, execution, and cleanup steps for an attack procedure. These documents contain both metadata about the attack (e.g. MITRE mappings, permissions) as well as Python code for executing the attack.

Timberlake is designed with modularity in mind. Test cases are defined and managed outside the tool and can be swapped around as needed for different execution scenarios.

Notable features of Timberlake:

  • Support for multiple credential profiles
  • Premade operations avaiable to all test cases (e.g. compound API actions, canned policies, etc)
  • API-level logging, including parameters
  • VECTR integration for tracking attack details

Example use can be found in examples

Note: Test cases should ideally be run in a non-production account

Install

pip install dist/*.whl

PyPI

pip install timberlake

Then install the following dependencies:

pip install git+https://github.com/SecurityRiskAdvisors/py-attire-schema.git

Usage

usage: timberlake [-h] -c CONFIG [-p PHASES] [-a ARGS]

optional arguments:
  -h, --help            show this help message and exit
  -c CONFIG, --config CONFIG
                        config file path
  -p {execution,setup,cleanup} [{execution,setup,cleanup} ...], --phases {execution,setup,cleanup} [{execution,setup,cleanup} ...]
                        list of phases to execute; default = all
  -a ARGS, --args ARGS  args file path
  • Config : path to config file; must exist
  • Phases : one or more phase names to execute; order doesn't matter
  • Args : YAML document of key-value pairs to override test case args

Details

Annotated schemas

Refer to test-case-schema.yml for test case schema details

Refer to config.yml for config file schema details

Attack sequencing

Basic execution

Basic execution mode refers to execution without using the VECTR integrations. The execution sequence is as follows:

  1. Collect test cases
  2. Run pre-execution hooks (e.g logging)
  3. Run test case blocks by phase (setup -> execution -> cleanup)
  4. Run post-execution hooks
  5. Exit

Execution details are logged to the TIMBERLAKE_LOGFILE location.

VECTR execution

VECTR execution mode refers to execution with added VECTR integration (via GraphQL). The excution sequence is as follows:

  1. Collect test cases
  2. Create assessment groups and campaigns in VECTR
  3. Run pre-execution hooks (e.g logging)
  4. Run test case blocks by phase (setup -> execution -> cleanup)
  5. Create test case in VECTR
    • all test cases are tagged with "timberlake"
    • test cases with errors are tagged with "error"
  6. Run post-execution hooks
  7. Write ATTiRe log to location specified in config. Details captured in ATTiRe log:
    • Cloud control plane API call details
  8. Exit

Note: Only code blocks in the execution phase create a test case and ATTiRe log

See also

  • https://github.com/FSecureLABS/leonidas : is a very similar concept, but test cases are performed as Lambda functions; test case schema is conceptually similar to what this tool wants to do and was a source of design inspiration

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distributions

No source distribution files available for this release.See tutorial on generating distribution archives.

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

timberlake-1.0.4-py3-none-any.whl (24.3 kB view details)

Uploaded Python 3

File details

Details for the file timberlake-1.0.4-py3-none-any.whl.

File metadata

  • Download URL: timberlake-1.0.4-py3-none-any.whl
  • Upload date:
  • Size: 24.3 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.1.0 CPython/3.13.7

File hashes

Hashes for timberlake-1.0.4-py3-none-any.whl
Algorithm Hash digest
SHA256 cb2931e7bec777868ce506be72ebb5a974a0d76a3c43da8a07418da0ecd0d440
MD5 d206c0761f7b657f6c9d21a64c38f52a
BLAKE2b-256 dbd1aac8e70c1b6e100bb985ba0d2e38d90f52ad3835b2b91407d43d6dc1468c

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page