jenganizer


Namejenganizer JSON
Version 0.1.1 PyPI version JSON
download
home_pagehttps://github.com/tenable/hidden-services-revealer
SummaryJenganizer is a tool to map hidden services in AWS. It does this by following the triggered events of a user's actions. When a user performs an action in AWS, it can trigger other events in other services. By following these events, users can identify services that are indirectly deployed by their actions. This can be important, as these resources can present security risks which should be managed and controlled.
upload_time2024-08-02 17:51:59
maintainerNone
docs_urlNone
authorTenable Inc.
requires_python>=3.8
licenseNone
keywords
VCS
bugtrack_url
requirements No requirements were recorded.
Travis-CI No Travis.
coveralls test coverage No coveralls.
            # Jenganizer - Hidden Service Revealer for AWS
Jenganizer is a tool to map hidden services in AWS. It does this by following the triggered events of a user's actions.
When a user performs an action in AWS, it can trigger other events in other services. By following these events, users
can identify services that are indirectly deployed by their actions. This can be important, as these resources can 
present security risks which should be managed and controlled.

## Installation
### Install
You can install the package from pypi.org
```bash
pip install jenganizer
```

## Usage

```bash
jenganizer --help
```

```
Usage: jenganizer [OPTIONS]

Options:
  --username TEXT      The username to filter events by  [required]
  --profile-name TEXT  The AWS profile name to use
  --region-name TEXT   The AWS region name to use
  --time-start TEXT    The start time for the event filter, format: YYYY-MM-DD
                       HH:MM:SS+00:00
  --time-end TEXT      The end time for the event filter, format: YYYY-MM-DD
                       HH:MM:SS+00:00
  --time-span TEXT     The time span, in minutes, to filter, going back from
                       now (use this instead of time_start and time_end)
  -d, --depth INTEGER  The depth of triggered events to follow. Depth=0: only
                       initial calls by the user, Depth=1: initial calls and
                       calls triggered by the initial calls, etc.
  -o, --output TEXT    The output file to write the triggered events to
  -v, --verbosity LVL  Either CRITICAL, ERROR, WARNING, INFO or DEBUG
  --help               Show this message and exit.


```

The way to map hidden services is to perform the initial call to the service with a specific user for the action you 
want to map, `jenganizer` will then follow the triggered events to find the resource indirectly deployed to other services.

In order to zoom in on the right events, you can use the `--time-start` and `--time-end`, or `--time-span`.

### The depth parameter
The `--depth` parameter is used to specify how many levels of triggered events to follow. Level 0 only looks at events
called directly from the user, level 1 looks at events called by the user and events called by the services used 
by those events. Such an examination naturally highlights some false positive, so it is important to verify the results.

### Results
The results are printed to the console as a list of events, and a file 
(default name: `triggered_events.json`) is written with the full events.
These events can be used to identify hidden services in AWS.



            

Raw data

            {
    "_id": null,
    "home_page": "https://github.com/tenable/hidden-services-revealer",
    "name": "jenganizer",
    "maintainer": null,
    "docs_url": null,
    "requires_python": ">=3.8",
    "maintainer_email": null,
    "keywords": null,
    "author": "Tenable Inc.",
    "author_email": "cs.research+opensource@tenable.com",
    "download_url": "https://files.pythonhosted.org/packages/49/4d/7c42e41633ec3b6b364183c7a29c2875419f6227f9cd3c2403fc01d42136/jenganizer-0.1.1.tar.gz",
    "platform": null,
    "description": "# Jenganizer - Hidden Service Revealer for AWS\nJenganizer is a tool to map hidden services in AWS. It does this by following the triggered events of a user's actions.\nWhen a user performs an action in AWS, it can trigger other events in other services. By following these events, users\ncan identify services that are indirectly deployed by their actions. This can be important, as these resources can \npresent security risks which should be managed and controlled.\n\n## Installation\n### Install\nYou can install the package from pypi.org\n```bash\npip install jenganizer\n```\n\n## Usage\n\n```bash\njenganizer --help\n```\n\n```\nUsage: jenganizer [OPTIONS]\n\nOptions:\n  --username TEXT      The username to filter events by  [required]\n  --profile-name TEXT  The AWS profile name to use\n  --region-name TEXT   The AWS region name to use\n  --time-start TEXT    The start time for the event filter, format: YYYY-MM-DD\n                       HH:MM:SS+00:00\n  --time-end TEXT      The end time for the event filter, format: YYYY-MM-DD\n                       HH:MM:SS+00:00\n  --time-span TEXT     The time span, in minutes, to filter, going back from\n                       now (use this instead of time_start and time_end)\n  -d, --depth INTEGER  The depth of triggered events to follow. Depth=0: only\n                       initial calls by the user, Depth=1: initial calls and\n                       calls triggered by the initial calls, etc.\n  -o, --output TEXT    The output file to write the triggered events to\n  -v, --verbosity LVL  Either CRITICAL, ERROR, WARNING, INFO or DEBUG\n  --help               Show this message and exit.\n\n\n```\n\nThe way to map hidden services is to perform the initial call to the service with a specific user for the action you \nwant to map, `jenganizer` will then follow the triggered events to find the resource indirectly deployed to other services.\n\nIn order to zoom in on the right events, you can use the `--time-start` and `--time-end`, or `--time-span`.\n\n### The depth parameter\nThe `--depth` parameter is used to specify how many levels of triggered events to follow. Level 0 only looks at events\ncalled directly from the user, level 1 looks at events called by the user and events called by the services used \nby those events. Such an examination naturally highlights some false positive, so it is important to verify the results.\n\n### Results\nThe results are printed to the console as a list of events, and a file \n(default name: `triggered_events.json`) is written with the full events.\nThese events can be used to identify hidden services in AWS.\n\n\n",
    "bugtrack_url": null,
    "license": null,
    "summary": "Jenganizer is a tool to map hidden services in AWS. It does this by following the triggered events of a user's actions. When a user performs an action in AWS, it can trigger other events in other services. By following these events, users can identify services that are indirectly deployed by their actions. This can be important, as these resources can present security risks which should be managed and controlled.",
    "version": "0.1.1",
    "project_urls": {
        "Bug Tracker": "https://github.com/tenable/hidden-services-revealer/issues",
        "Homepage": "https://github.com/tenable/hidden-services-revealer"
    },
    "split_keywords": [],
    "urls": [
        {
            "comment_text": "",
            "digests": {
                "blake2b_256": "494d7c42e41633ec3b6b364183c7a29c2875419f6227f9cd3c2403fc01d42136",
                "md5": "e60aca21d27ef83dd1fe77a811808c76",
                "sha256": "4e8670a10a9998d0d4c0f5f641fdc07f61ec1bcd1cc1da7cb09e7c220f950143"
            },
            "downloads": -1,
            "filename": "jenganizer-0.1.1.tar.gz",
            "has_sig": false,
            "md5_digest": "e60aca21d27ef83dd1fe77a811808c76",
            "packagetype": "sdist",
            "python_version": "source",
            "requires_python": ">=3.8",
            "size": 9050,
            "upload_time": "2024-08-02T17:51:59",
            "upload_time_iso_8601": "2024-08-02T17:51:59.379694Z",
            "url": "https://files.pythonhosted.org/packages/49/4d/7c42e41633ec3b6b364183c7a29c2875419f6227f9cd3c2403fc01d42136/jenganizer-0.1.1.tar.gz",
            "yanked": false,
            "yanked_reason": null
        }
    ],
    "upload_time": "2024-08-02 17:51:59",
    "github": true,
    "gitlab": false,
    "bitbucket": false,
    "codeberg": false,
    "github_user": "tenable",
    "github_project": "hidden-services-revealer",
    "travis_ci": false,
    "coveralls": false,
    "github_actions": false,
    "requirements": [],
    "lcname": "jenganizer"
}
        
Elapsed time: 0.50687s