Tiller / Helm - Port 44134
Basic info
The Tiller Problem
Impact Scenarios
Historical Context
Understanding Helm and Tiller Architecture
What is Helm?
Helm 2 vs Helm 3
Tiller Service Account & RBAC
Tiller Communication Protocol
Why Tiller is a Security Risk
1. No Authentication Required
2. Cluster-Admin Privileges
3. Network Accessibility
4. Attack Chain
5. Real-World Impact
Reconnaissance & Discovery
1. Internal Discovery (From Compromised Pod)
2. External Discovery (Network Perspective)
3. Kubernetes API Discovery (if accessible)
4. Cloud Provider Metadata (GKE/EKS/AKS)
Enumeration Techniques
1. Installing Helm Client in Compromised Pod
2. Testing Connectivity
3. Listing Helm Releases
4. Inspecting Release Content
5. Discovering Helm Repositories
6. Checking Tiller Configuration
Authentication & Access Analysis
1. Understanding Tiller's Default Security Posture
Security Control
Default State
Risk
2. Testing Authentication
3. Analyzing Tiller's Service Account Permissions
4. Network Policy Analysis
5. Attempting Unauthorized Access
Exploitation Techniques
1. Basic Privilege Escalation via Helm Chart Deployment
2. Remote Code Execution via Malicious Chart
3. Credential Harvesting
4. Persistent Backdoor Deployment
5. Cryptomining Deployment
Post-Exploitation & Privilege Escalation
1. Stealing Tiller's Service Account Token
2. Using ropnop's Pentest Charts
3. Direct Kubernetes API Access
4. Configuring kubectl with Stolen Token
5. Establishing Persistent Access
Advanced Attack Scenarios
1. Lateral Movement to Cloud Provider
2. Container Escape via Privileged Pod
3. Secret Exfiltration at Scale
4. Namespace Takeover
5. Supply Chain Attack via Chart Repository
Kubernetes API Takeover
1. External API Access with Stolen Token
2. Creating Persistent Admin Users
3. Deploying WebShell for Persistent Access
Defense & Mitigation
1. Immediate Actions
2. Upgrade to Helm 3
3. Securing Helm 2 (if migration not possible)
4. Network Security
5. Detection & Monitoring
6. Best Practices
Practical Lab Scenarios
Lab 1: Setting Up Vulnerable Environment
Lab 2: Exploitation Exercise
Lab 3: Detection Exercise
Lab 4: Remediation Exercise
Conclusion
Additional Resources
Tools
Research & Writeups
Last updated