SmogCloud

Find cloud assets that no one wants exposed

Multi-Cloud Open Source Self Hosted Only
Category Penetration Testing Tools
GitHub Stars 333
Last Commit 4 years ago
This page updated a month ago
Pricing Details Free and open-source
Target Audience Penetration testers, offensive security professionals.

CloudFox manages gaining situational awareness and identifying exploitable attack paths in unfamiliar cloud environments, particularly for penetration testers and offensive security professionals. This command-line tool is designed to be modular, allowing users to run specific commands or execute a comprehensive set of checks with the aws all-checks command, which leverages sane defaults to streamline the process.

Technically, CloudFox operates by enumerating cloud resources and permissions, even with limited read-only permissions. It supports multiple cloud providers, including AWS, Azure, and GCP, although its current feature set is most extensive for AWS, with 34 specific commands available. The tool is built to be portable and quick, codifying common sed, awk, grep, and jq commands into a unified interface. This approach enables users to efficiently identify potential attack paths without the need for extensive cloud security expertise.

Operationally, CloudFox is flexible, allowing users to run commands with "found" credentials, similar to tools like weirdAAL or enumerate-iam. It is designed to work silently, returning data only when the provided credentials have the necessary access, which helps in simulating compromise scenarios effectively. However, users should be aware that some commands may fail silently, and the tool does not generate alerts or compliance findings, focusing solely on manual penetration testing activities.

From a technical standpoint, CloudFox relies on Go for its implementation and can be installed via various methods, including binary downloads, Homebrew, or direct compilation from the source repository. The tool's architecture emphasizes real-time enumeration over historical analysis, making it a valuable asset for penetration testers looking to quickly map and exploit vulnerabilities in cloud environments.

Improve this page