| Name | jenganizer JSON |
| Version |
0.1.1
JSON |
| download |
| home_page | https://github.com/tenable/hidden-services-revealer |
| Summary | Jenganizer is a tool to map hidden services in AWS. It does this by following the triggered events of a user's actions. When a user performs an action in AWS, it can trigger other events in other services. By following these events, users can identify services that are indirectly deployed by their actions. This can be important, as these resources can present security risks which should be managed and controlled. |
| upload_time | 2024-08-02 17:51:59 |
| maintainer | None |
| docs_url | None |
| author | Tenable Inc. |
| requires_python | >=3.8 |
| license | None |
| keywords |
|
| VCS |
 |
| bugtrack_url |
|
| requirements |
No requirements were recorded.
|
| Travis-CI |
No Travis.
|
| coveralls test coverage |
No coveralls.
|
# Jenganizer - Hidden Service Revealer for AWS
Jenganizer is a tool to map hidden services in AWS. It does this by following the triggered events of a user's actions.
When a user performs an action in AWS, it can trigger other events in other services. By following these events, users
can identify services that are indirectly deployed by their actions. This can be important, as these resources can
present security risks which should be managed and controlled.
## Installation
### Install
You can install the package from pypi.org
```bash
pip install jenganizer
```
## Usage
```bash
jenganizer --help
```
```
Usage: jenganizer [OPTIONS]
Options:
--username TEXT The username to filter events by [required]
--profile-name TEXT The AWS profile name to use
--region-name TEXT The AWS region name to use
--time-start TEXT The start time for the event filter, format: YYYY-MM-DD
HH:MM:SS+00:00
--time-end TEXT The end time for the event filter, format: YYYY-MM-DD
HH:MM:SS+00:00
--time-span TEXT The time span, in minutes, to filter, going back from
now (use this instead of time_start and time_end)
-d, --depth INTEGER The depth of triggered events to follow. Depth=0: only
initial calls by the user, Depth=1: initial calls and
calls triggered by the initial calls, etc.
-o, --output TEXT The output file to write the triggered events to
-v, --verbosity LVL Either CRITICAL, ERROR, WARNING, INFO or DEBUG
--help Show this message and exit.
```
The way to map hidden services is to perform the initial call to the service with a specific user for the action you
want to map, `jenganizer` will then follow the triggered events to find the resource indirectly deployed to other services.
In order to zoom in on the right events, you can use the `--time-start` and `--time-end`, or `--time-span`.
### The depth parameter
The `--depth` parameter is used to specify how many levels of triggered events to follow. Level 0 only looks at events
called directly from the user, level 1 looks at events called by the user and events called by the services used
by those events. Such an examination naturally highlights some false positive, so it is important to verify the results.
### Results
The results are printed to the console as a list of events, and a file
(default name: `triggered_events.json`) is written with the full events.
These events can be used to identify hidden services in AWS.
Raw data
{
"_id": null,
"home_page": "https://github.com/tenable/hidden-services-revealer",
"name": "jenganizer",
"maintainer": null,
"docs_url": null,
"requires_python": ">=3.8",
"maintainer_email": null,
"keywords": null,
"author": "Tenable Inc.",
"author_email": "cs.research+opensource@tenable.com",
"download_url": "https://files.pythonhosted.org/packages/49/4d/7c42e41633ec3b6b364183c7a29c2875419f6227f9cd3c2403fc01d42136/jenganizer-0.1.1.tar.gz",
"platform": null,
"description": "# Jenganizer - Hidden Service Revealer for AWS\nJenganizer is a tool to map hidden services in AWS. It does this by following the triggered events of a user's actions.\nWhen a user performs an action in AWS, it can trigger other events in other services. By following these events, users\ncan identify services that are indirectly deployed by their actions. This can be important, as these resources can \npresent security risks which should be managed and controlled.\n\n## Installation\n### Install\nYou can install the package from pypi.org\n```bash\npip install jenganizer\n```\n\n## Usage\n\n```bash\njenganizer --help\n```\n\n```\nUsage: jenganizer [OPTIONS]\n\nOptions:\n --username TEXT The username to filter events by [required]\n --profile-name TEXT The AWS profile name to use\n --region-name TEXT The AWS region name to use\n --time-start TEXT The start time for the event filter, format: YYYY-MM-DD\n HH:MM:SS+00:00\n --time-end TEXT The end time for the event filter, format: YYYY-MM-DD\n HH:MM:SS+00:00\n --time-span TEXT The time span, in minutes, to filter, going back from\n now (use this instead of time_start and time_end)\n -d, --depth INTEGER The depth of triggered events to follow. Depth=0: only\n initial calls by the user, Depth=1: initial calls and\n calls triggered by the initial calls, etc.\n -o, --output TEXT The output file to write the triggered events to\n -v, --verbosity LVL Either CRITICAL, ERROR, WARNING, INFO or DEBUG\n --help Show this message and exit.\n\n\n```\n\nThe way to map hidden services is to perform the initial call to the service with a specific user for the action you \nwant to map, `jenganizer` will then follow the triggered events to find the resource indirectly deployed to other services.\n\nIn order to zoom in on the right events, you can use the `--time-start` and `--time-end`, or `--time-span`.\n\n### The depth parameter\nThe `--depth` parameter is used to specify how many levels of triggered events to follow. Level 0 only looks at events\ncalled directly from the user, level 1 looks at events called by the user and events called by the services used \nby those events. Such an examination naturally highlights some false positive, so it is important to verify the results.\n\n### Results\nThe results are printed to the console as a list of events, and a file \n(default name: `triggered_events.json`) is written with the full events.\nThese events can be used to identify hidden services in AWS.\n\n\n",
"bugtrack_url": null,
"license": null,
"summary": "Jenganizer is a tool to map hidden services in AWS. It does this by following the triggered events of a user's actions. When a user performs an action in AWS, it can trigger other events in other services. By following these events, users can identify services that are indirectly deployed by their actions. This can be important, as these resources can present security risks which should be managed and controlled.",
"version": "0.1.1",
"project_urls": {
"Bug Tracker": "https://github.com/tenable/hidden-services-revealer/issues",
"Homepage": "https://github.com/tenable/hidden-services-revealer"
},
"split_keywords": [],
"urls": [
{
"comment_text": "",
"digests": {
"blake2b_256": "494d7c42e41633ec3b6b364183c7a29c2875419f6227f9cd3c2403fc01d42136",
"md5": "e60aca21d27ef83dd1fe77a811808c76",
"sha256": "4e8670a10a9998d0d4c0f5f641fdc07f61ec1bcd1cc1da7cb09e7c220f950143"
},
"downloads": -1,
"filename": "jenganizer-0.1.1.tar.gz",
"has_sig": false,
"md5_digest": "e60aca21d27ef83dd1fe77a811808c76",
"packagetype": "sdist",
"python_version": "source",
"requires_python": ">=3.8",
"size": 9050,
"upload_time": "2024-08-02T17:51:59",
"upload_time_iso_8601": "2024-08-02T17:51:59.379694Z",
"url": "https://files.pythonhosted.org/packages/49/4d/7c42e41633ec3b6b364183c7a29c2875419f6227f9cd3c2403fc01d42136/jenganizer-0.1.1.tar.gz",
"yanked": false,
"yanked_reason": null
}
],
"upload_time": "2024-08-02 17:51:59",
"github": true,
"gitlab": false,
"bitbucket": false,
"codeberg": false,
"github_user": "tenable",
"github_project": "hidden-services-revealer",
"travis_ci": false,
"coveralls": false,
"github_actions": false,
"requirements": [],
"lcname": "jenganizer"
}