{"id":11267,"date":"2020-08-20T09:00:34","date_gmt":"2020-08-20T03:30:34","guid":{"rendered":"http:\/\/kalilinuxtutorials.com\/?p=11267"},"modified":"2020-08-20T09:00:34","modified_gmt":"2020-08-20T03:30:34","slug":"skyark","status":"publish","type":"post","link":"https:\/\/kalilinuxtutorials.com\/skyark\/","title":{"rendered":"SkyArk : A Cloud Security Project With Two Main Scanning Modules"},"content":{"rendered":"\n<p><strong>SkyArk<\/strong> is a cloud security project with two main scanning modules:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>AzureStealth &#8211; <\/strong>Scans Azure environments<\/li><li><strong>AWStealth &#8211;<\/strong> Scan AWS environments<\/li><\/ul>\n\n\n\n<p>These two scanning modules will discover the most privileged entities in the target AWS and Azure.<\/p>\n\n\n\n<p class=\"has-text-align-center has-vivid-green-cyan-background-color has-background\"><strong>The Main Goal &#8211; Discover The Most Privileged Cloud Users<\/strong><\/p>\n\n\n\n<p>It currently focuses on mitigating the new threat of Cloud Shadow Admins, and helps organizations to discover, assess and protect cloud privileged entities.<\/p>\n\n\n\n<p>Stealthy and undercover cloud admins may reside in every public cloud platform and SkyArk helps mitigating the risk in AWS and Azure.<\/p>\n\n\n\n<p>In defensive\/pentest\/risk assessment procedures &#8211; make sure to address the threat and validate that those privileged entities are indeed well secured.<\/p>\n\n\n\n<p class=\"has-text-align-center has-vivid-green-cyan-background-color has-background\"><strong>Background<\/strong><\/p>\n\n\n\n<p>SkyArk deals with the new uprising threat of Cloud Shadow Admins &#8211; how attackers can find and abuse non-trivial and so-called \u201climited\u201d permissions to still make it through and escalate their privileges and become full cloud admins.<br>Furthermore, attackers can easily use those tricky specific permissions to hide stealthy admin entities that will wait for them as an undercover persistence technique.<\/p>\n\n\n\n<p>SkyArk was initially published as part of our research on the threat of AWS Shadow Admins, this research was presented at RSA USA 2018 conference.<br>The AWS Shadow Admins blog post:<\/p>\n\n\n\n<p><a href=\"https:\/\/www.cyberark.com\/threat-research-blog\/cloud-shadow-admin-threat-10-permissions-protect\/\">https:\/\/www.cyberark.com\/threat-research-blog\/cloud-shadow-admin-threat-10-permissions-protect\/<\/a><\/p>\n\n\n\n<p>The recording of the RSA talk:<\/p>\n\n\n\n<p><a href=\"https:\/\/www.rsaconference.com\/videos\/sneak-your-way-to-cloud-persistenceshadow-admins-are-here-to-stay\">https:\/\/www.rsaconference.com\/videos\/sneak-your-way-to-cloud-persistenceshadow-admins-are-here-to-stay<\/a><\/p>\n\n\n\n<p>About a year later, we added the AzureStealth scan to SkyArk for mitigating the Shadow Admins threat in Azure!<\/p>\n\n\n\n<p class=\"has-text-align-center has-vivid-green-cyan-background-color has-background\"><strong>Tool Description<\/strong><\/p>\n\n\n\n<p>It currently contains two main scanning modules <strong>AWStealth<\/strong> and <strong>AzureStealth<\/strong>.<\/p>\n\n\n\n<p>With the scanning results &#8211; organizations can discover the entities (users, groups and roles) who have the most sensitive and risky permissions.<br>In addition, we also encourage organizations to scan their environments from time to time and search for suspicious deviations in their privileged entities list.<\/p>\n\n\n\n<p><strong>Potential attackers are hunting for those users and the defensive teams should make sure these privileged users are well secured &#8211; have strong, rotated and safety stored credentials, have MFA enabled, being monitored carefully, etc.<\/strong><\/p>\n\n\n\n<p>Remember that we cannot protect the things we don\u2019t aware of, and SkyArk helps in the complex mission of discovering the most privileged cloud entities &#8211; including the straight-forward admins and also the stealthy shadow admins that could easily escalate their privileges and become full admins as well.<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>AzureStealth Scan<\/strong><\/li><\/ul>\n\n\n\n<p>Discover the most privileged users in the scanned Azure environment &#8211; including the Azure Shadow Admins.<\/p>\n\n\n\n<p class=\"has-text-align-center has-vivid-green-cyan-background-color has-background\"><strong>How To Run AzureStealth?<\/strong><\/p>\n\n\n\n<p>The full details are in the AzureStealth&#8217;s Readme file:<br><a href=\"https:\/\/github.com\/cyberark\/SkyArk\/blob\/master\/AzureStealth\/README.md\">https:\/\/github.com\/cyberark\/SkyArk\/blob\/master\/AzureStealth\/README.md<\/a><br>In short:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Download\/sync locally the SkyArk project<\/li><li>Open PowerShell in the SkyArk folder with the permission to run scripts:<br>&#8220;powershell -ExecutionPolicy Bypass -NoProfile&#8221;<\/li><li>Run the following commands:<\/li><\/ul>\n\n\n\n<p class=\"has-vivid-green-cyan-color has-black-background-color has-text-color has-background\"><strong>(1) Import-Module .\\SkyArk.ps1 -force <br>(2) Start-AzureStealth <\/strong><\/p>\n\n\n\n<p>AzureStealth needs only Read-Only permissions over the scanned Azure Directory (Tenant) and Subscription.<br>*You can also run the scan easily from within the Azure Portal by using the built-in CloudShell:<\/p>\n\n\n\n<p class=\"has-vivid-green-cyan-color has-black-background-color has-text-color has-background\"><strong>(1) IEX (New-Object Net.WebClient).DownloadString(&#8216;https:\/\/raw.githubusercontent.com\/cyberark\/SkyArk\/master\/AzureStealth\/AzureStealth.ps1&#8217;)<br>(2) Scan-AzureAdmins<\/strong>   <\/p>\n\n\n\n<p class=\"has-text-align-center has-vivid-green-cyan-background-color has-background\"><strong>AzureStealth DEMO<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/1.bp.blogspot.com\/-liWFwkVipJo\/Xzvcp1CeFRI\/AAAAAAAAHWw\/0IrXJLxBJ8ACcDa_kHILH1IDSfo_g4ZNQCLcBGAsYHQ\/s1920\/DEMO-1.gif\" alt=\"\"\/><\/figure>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>AWStealth Scan<\/strong><\/li><\/ul>\n\n\n\n<p>Discover the most privileged entities in the scanned AWS environment &#8211; including the Azure Shadow Admins.<\/p>\n\n\n\n<p class=\"has-text-align-center has-vivid-green-cyan-background-color has-background\"><strong>How To Run AWStealth<\/strong>?<\/p>\n\n\n\n<p>The full details are in the AWStealth&#8217;s Readme file:<br><a href=\"https:\/\/github.com\/cyberark\/SkyArk\/tree\/master\/AWStealth\">https:\/\/github.com\/cyberark\/SkyArk\/tree\/master\/AWStealth<\/a><br>In short:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Download\/sync locally the SkyArk project<\/li><li>Open PowerShell in the SkyArk folder with the permission to run scripts:<br>&#8220;powershell -ExecutionPolicy Bypass -NoProfile&#8221;<\/li><li>Run the following commands:<\/li><\/ul>\n\n\n\n<p class=\"has-vivid-green-cyan-color has-black-background-color has-text-color has-background\"><strong>(1) Import-Module .\\SkyArk.ps1 -force <br>(2) Start-AWStealth <\/strong><\/p>\n\n\n\n<p>AWStealth needs only Read-Only permissions over the IAM service of the scanned AWS environment.<\/p>\n\n\n\n<p class=\"has-text-align-center has-vivid-green-cyan-background-color has-background\"><strong>AWStealth DEMO:<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image size-large is-style-default\"><img decoding=\"async\" src=\"https:\/\/1.bp.blogspot.com\/-ezqB0DpQoyg\/XzvdU1Ji8pI\/AAAAAAAAHW4\/t91jdhMXdGgQjrd4o4oBshQg7PqAGfzTQCLcBGAsYHQ\/s1280\/DEMO-2.gif\" alt=\"\"\/><\/figure>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>SkyArk includes more small sub-modules for playing around in the cloud security field<\/strong><\/li><\/ul>\n\n\n\n<ul class=\"wp-block-list\"><li>An example for such a sub-module is <strong>AWStrace<\/strong> module.<\/li><li><strong>AWStrace &#8211; analyzes AWS CloudTrail Logs and can provide new valuable insights from CloudTrail logs.<\/strong><\/li><li>It especially prioritizes risky sensitive IAM actions that potential attackers might use as part of their malicious actions as AWS Shadow Admins.<\/li><li>The module analyzes the log files and produces informative csv result file with important details on each executed action in the tested environment.<\/li><li>Security teams can use the results files to investigate sensitive actions, discover the entities that took those actions and reveal additional valuable details on each executed and logged action.<\/li><\/ul>\n\n\n\n<p class=\"has-text-align-center has-vivid-green-cyan-background-color has-background\"><strong>Quick Start<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Take a look at the Readme files of the scanning modules:<ul><li><strong>AzureStealth &#8211;<\/strong> <a href=\"https:\/\/github.com\/cyberark\/SkyArk\/blob\/master\/AzureStealth\/README.md\">https:\/\/github.com\/cyberark\/SkyArk\/blob\/master\/AzureStealth\/README.md<\/a><\/li><li><strong>AWStealth &#8211;<\/strong> <a href=\"https:\/\/github.com\/cyberark\/SkyArk\/blob\/master\/AWStealth\/README.md\">https:\/\/github.com\/cyberark\/SkyArk\/blob\/master\/AWStealth\/README.md<\/a><\/li><\/ul><\/li><\/ul>\n\n\n\n<div class=\"wp-block-buttons aligncenter is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-outline is-style-outline--1\"><a class=\"wp-block-button__link has-vivid-cyan-blue-background-color has-background\" href=\"https:\/\/github.com\/cyberark\/SkyArk\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Download<\/strong><\/a><\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>SkyArk is a cloud security project with two main scanning modules: AzureStealth &#8211; Scans Azure environments AWStealth &#8211; Scan AWS environments These two scanning modules will discover the most privileged entities in the target AWS and Azure. The Main Goal &#8211; Discover The Most Privileged Cloud Users It currently focuses on mitigating the new threat [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":16476,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"fifu_image_url":"https:\/\/1.bp.blogspot.com\/-hUmcYFzRuoI\/Xzvd1mOQ2pI\/AAAAAAAAHXA\/BMX4Lgdj8w4hPLfJA_HKg7fOIstCV-LlQCLcBGAsYHQ\/s728\/SkyArk%25281%2529.png","fifu_image_alt":"SkyArk : A Cloud Security Project With Two Main Scanning Modules","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[28],"tags":[312,318,585,587,3121],"class_list":["post-11267","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-kali","tag-awstealth","tag-azurestealth","tag-cloud","tag-cloud-security","tag-skyark"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>SkyArk : A Cloud Security Project With Two Main Scanning Modules<\/title>\n<meta name=\"description\" content=\"SkyArk is a cloud security project with two main scanning modules. These two scanning modules will discover the most privileged entities in the target\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kalilinuxtutorials.com\/skyark\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"SkyArk : A Cloud Security Project With Two Main Scanning Modules\" \/>\n<meta property=\"og:description\" content=\"SkyArk is a cloud security project with two main scanning modules. These two scanning modules will discover the most privileged entities in the target\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kalilinuxtutorials.com\/skyark\/\" \/>\n<meta property=\"og:site_name\" content=\"Kali Linux Tutorials\" \/>\n<meta property=\"article:published_time\" content=\"2020-08-20T03:30:34+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/1.bp.blogspot.com\/-hUmcYFzRuoI\/Xzvd1mOQ2pI\/AAAAAAAAHXA\/BMX4Lgdj8w4hPLfJA_HKg7fOIstCV-LlQCLcBGAsYHQ\/s728\/SkyArk%25281%2529.png\" \/>\n<meta name=\"author\" content=\"R K\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/1.bp.blogspot.com\/-hUmcYFzRuoI\/Xzvd1mOQ2pI\/AAAAAAAAHXA\/BMX4Lgdj8w4hPLfJA_HKg7fOIstCV-LlQCLcBGAsYHQ\/s728\/SkyArk%25281%2529.png\" \/>\n<meta name=\"twitter:creator\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:site\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"R K\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/skyark\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/skyark\/\"},\"author\":{\"name\":\"R K\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad\"},\"headline\":\"SkyArk : A Cloud Security Project With Two Main Scanning Modules\",\"datePublished\":\"2020-08-20T03:30:34+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/skyark\/\"},\"wordCount\":758,\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/skyark\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/1.bp.blogspot.com\/-hUmcYFzRuoI\/Xzvd1mOQ2pI\/AAAAAAAAHXA\/BMX4Lgdj8w4hPLfJA_HKg7fOIstCV-LlQCLcBGAsYHQ\/s728\/SkyArk%25281%2529.png\",\"keywords\":[\"AWStealth\",\"AzureStealth\",\"Cloud\",\"Cloud Security\",\"SkyArk\"],\"articleSection\":[\"Kali Linux\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/skyark\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/skyark\/\",\"name\":\"SkyArk : A Cloud Security Project With Two Main Scanning Modules\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/skyark\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/skyark\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/1.bp.blogspot.com\/-hUmcYFzRuoI\/Xzvd1mOQ2pI\/AAAAAAAAHXA\/BMX4Lgdj8w4hPLfJA_HKg7fOIstCV-LlQCLcBGAsYHQ\/s728\/SkyArk%25281%2529.png\",\"datePublished\":\"2020-08-20T03:30:34+00:00\",\"description\":\"SkyArk is a cloud security project with two main scanning modules. These two scanning modules will discover the most privileged entities in the target\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/skyark\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/skyark\/#primaryimage\",\"url\":\"https:\/\/1.bp.blogspot.com\/-hUmcYFzRuoI\/Xzvd1mOQ2pI\/AAAAAAAAHXA\/BMX4Lgdj8w4hPLfJA_HKg7fOIstCV-LlQCLcBGAsYHQ\/s728\/SkyArk%25281%2529.png\",\"contentUrl\":\"https:\/\/1.bp.blogspot.com\/-hUmcYFzRuoI\/Xzvd1mOQ2pI\/AAAAAAAAHXA\/BMX4Lgdj8w4hPLfJA_HKg7fOIstCV-LlQCLcBGAsYHQ\/s728\/SkyArk%25281%2529.png\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"name\":\"Kali Linux Tutorials\",\"description\":\"Kali Linux Tutorials\",\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\",\"name\":\"Kali Linux Tutorials\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"contentUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"width\":272,\"height\":90,\"caption\":\"Kali Linux Tutorials\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/CyberEdition\",\"https:\/\/www.threads.com\/@cybersecurityedition\",\"https:\/\/www.linkedin.com\/company\/cyberedition\",\"https:\/\/www.instagram.com\/cybersecurityedition\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad\",\"name\":\"R K\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g\",\"caption\":\"R K\"},\"url\":\"https:\/\/kalilinuxtutorials.com\/author\/ranjith\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"SkyArk : A Cloud Security Project With Two Main Scanning Modules","description":"SkyArk is a cloud security project with two main scanning modules. These two scanning modules will discover the most privileged entities in the target","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kalilinuxtutorials.com\/skyark\/","og_locale":"en_US","og_type":"article","og_title":"SkyArk : A Cloud Security Project With Two Main Scanning Modules","og_description":"SkyArk is a cloud security project with two main scanning modules. These two scanning modules will discover the most privileged entities in the target","og_url":"https:\/\/kalilinuxtutorials.com\/skyark\/","og_site_name":"Kali Linux Tutorials","article_published_time":"2020-08-20T03:30:34+00:00","og_image":[{"url":"https:\/\/1.bp.blogspot.com\/-hUmcYFzRuoI\/Xzvd1mOQ2pI\/AAAAAAAAHXA\/BMX4Lgdj8w4hPLfJA_HKg7fOIstCV-LlQCLcBGAsYHQ\/s728\/SkyArk%25281%2529.png","type":"","width":"","height":""}],"author":"R K","twitter_card":"summary_large_image","twitter_image":"https:\/\/1.bp.blogspot.com\/-hUmcYFzRuoI\/Xzvd1mOQ2pI\/AAAAAAAAHXA\/BMX4Lgdj8w4hPLfJA_HKg7fOIstCV-LlQCLcBGAsYHQ\/s728\/SkyArk%25281%2529.png","twitter_creator":"@CyberEdition","twitter_site":"@CyberEdition","twitter_misc":{"Written by":"R K","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/kalilinuxtutorials.com\/skyark\/#article","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/skyark\/"},"author":{"name":"R K","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad"},"headline":"SkyArk : A Cloud Security Project With Two Main Scanning Modules","datePublished":"2020-08-20T03:30:34+00:00","mainEntityOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/skyark\/"},"wordCount":758,"publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/skyark\/#primaryimage"},"thumbnailUrl":"https:\/\/1.bp.blogspot.com\/-hUmcYFzRuoI\/Xzvd1mOQ2pI\/AAAAAAAAHXA\/BMX4Lgdj8w4hPLfJA_HKg7fOIstCV-LlQCLcBGAsYHQ\/s728\/SkyArk%25281%2529.png","keywords":["AWStealth","AzureStealth","Cloud","Cloud Security","SkyArk"],"articleSection":["Kali Linux"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/kalilinuxtutorials.com\/skyark\/","url":"https:\/\/kalilinuxtutorials.com\/skyark\/","name":"SkyArk : A Cloud Security Project With Two Main Scanning Modules","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/skyark\/#primaryimage"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/skyark\/#primaryimage"},"thumbnailUrl":"https:\/\/1.bp.blogspot.com\/-hUmcYFzRuoI\/Xzvd1mOQ2pI\/AAAAAAAAHXA\/BMX4Lgdj8w4hPLfJA_HKg7fOIstCV-LlQCLcBGAsYHQ\/s728\/SkyArk%25281%2529.png","datePublished":"2020-08-20T03:30:34+00:00","description":"SkyArk is a cloud security project with two main scanning modules. These two scanning modules will discover the most privileged entities in the target","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kalilinuxtutorials.com\/skyark\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/skyark\/#primaryimage","url":"https:\/\/1.bp.blogspot.com\/-hUmcYFzRuoI\/Xzvd1mOQ2pI\/AAAAAAAAHXA\/BMX4Lgdj8w4hPLfJA_HKg7fOIstCV-LlQCLcBGAsYHQ\/s728\/SkyArk%25281%2529.png","contentUrl":"https:\/\/1.bp.blogspot.com\/-hUmcYFzRuoI\/Xzvd1mOQ2pI\/AAAAAAAAHXA\/BMX4Lgdj8w4hPLfJA_HKg7fOIstCV-LlQCLcBGAsYHQ\/s728\/SkyArk%25281%2529.png"},{"@type":"WebSite","@id":"https:\/\/kalilinuxtutorials.com\/#website","url":"https:\/\/kalilinuxtutorials.com\/","name":"Kali Linux Tutorials","description":"Kali Linux Tutorials","publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/kalilinuxtutorials.com\/#organization","name":"Kali Linux Tutorials","url":"https:\/\/kalilinuxtutorials.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/","url":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","contentUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","width":272,"height":90,"caption":"Kali Linux Tutorials"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/CyberEdition","https:\/\/www.threads.com\/@cybersecurityedition","https:\/\/www.linkedin.com\/company\/cyberedition","https:\/\/www.instagram.com\/cybersecurityedition\/"]},{"@type":"Person","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad","name":"R K","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g","caption":"R K"},"url":"https:\/\/kalilinuxtutorials.com\/author\/ranjith\/"}]}},"jetpack_featured_media_url":"https:\/\/1.bp.blogspot.com\/-hUmcYFzRuoI\/Xzvd1mOQ2pI\/AAAAAAAAHXA\/BMX4Lgdj8w4hPLfJA_HKg7fOIstCV-LlQCLcBGAsYHQ\/s728\/SkyArk%25281%2529.png","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":29718,"url":"https:\/\/kalilinuxtutorials.com\/vajra\/","url_meta":{"origin":11267,"position":0},"title":"Vajra &#8211; Your Weapon To Cloud","author":"Varshini","date":"August 24, 2023","format":false,"excerpt":"About Vajra Vajra is a tool with a graphical user interface that can be used to attack and look around in the Azure environment of a target. In Indian folklore, Vajra is the name of the weapon of the god of thunder and storms, Indra. Because it works with the\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhMavK2m55ocs3a8TmOGIb6wexVkvD4_o0JO7vRa96xAng-XHF_IzxPJ7WT6_by8wPL3mPnrDe651PTlBKb-HVxFqDOa5p687HuBiAcOcPjQFKIxUyoFkoMuPZsuvT_Rttn4TXU1qwyF15e2-O6woE1k9OhDEtT1i8Nrt6ltkKNmZd6-t_-hMsYs8tNjw\/s16000\/68747470733a2f2f6d65646961332e67697068792e636f6d2f6d656469612f705a4f4d76555666564b4a575030354b77772f67697068792e676966.gif?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":6642,"url":"https:\/\/kalilinuxtutorials.com\/scout-suite-multi-cloud-security-auditing-tool\/","url_meta":{"origin":11267,"position":1},"title":"Scout Suite : Multi-Cloud Security Auditing Tool","author":"R K","date":"September 28, 2019","format":false,"excerpt":"Scout Suite is an open source multi-cloud security-auditing tool, which enables security posture assessment of cloud environments. Using the APIs exposed by cloud providers, Scout Suite gathers configuration data for manual inspection and highlights risk areas. Rather than going through dozens of pages on the web consoles, Scout Suite presents\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":36638,"url":"https:\/\/kalilinuxtutorials.com\/azure-secops\/","url_meta":{"origin":11267,"position":2},"title":"Azure-SecOps : Streamlining Security Operations In The Cloud","author":"Varshini","date":"February 24, 2025","format":false,"excerpt":"Azure-SecOps is a critical framework that integrates security tools and operational processes to ensure robust threat detection, mitigation, and compliance in Microsoft's Azure ecosystem. By leveraging a combination of advanced tools and automation, Azure-SecOps bridges the gap between security and operations, enabling organizations to maintain a secure and compliant cloud\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/Azure-SecOps.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/Azure-SecOps.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/Azure-SecOps.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/Azure-SecOps.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/Azure-SecOps.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/Azure-SecOps.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":23159,"url":"https:\/\/kalilinuxtutorials.com\/cloudsploit\/","url_meta":{"origin":11267,"position":3},"title":"Cloudsploit : Cloud Security Posture Management (CSPM)","author":"R K","date":"March 23, 2022","format":false,"excerpt":"CloudSploit by Aqua is an open-source project designed to allow detection of security risks in cloud infrastructure accounts, including: Amazon Web Services (AWS), Microsoft Azure, Google Cloud Platform (GCP), Oracle Cloud Infrastructure (OCI), and GitHub. These scripts are designed to return a series of potential misconfigurations and security risks. Deployment\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEiVOrx7So8VhwZf68OG0XjsU5OMjAFTePLH9eewCFmrtz2Pazz73NSnUNtaqG88r54R8LpT0ZFizohnJ_OaJ7_76k3-hj1Uh-uxoOvyC1_x_g_4s3afYgChZ9yof3hNKal5yPXvSamBmRA2fqbANjdyxzhB2ZsJigAiOS-f8ULSG0koDVsk65wwOlxi=s728","width":350,"height":200,"srcset":"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEiVOrx7So8VhwZf68OG0XjsU5OMjAFTePLH9eewCFmrtz2Pazz73NSnUNtaqG88r54R8LpT0ZFizohnJ_OaJ7_76k3-hj1Uh-uxoOvyC1_x_g_4s3afYgChZ9yof3hNKal5yPXvSamBmRA2fqbANjdyxzhB2ZsJigAiOS-f8ULSG0koDVsk65wwOlxi=s728 1x, https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEiVOrx7So8VhwZf68OG0XjsU5OMjAFTePLH9eewCFmrtz2Pazz73NSnUNtaqG88r54R8LpT0ZFizohnJ_OaJ7_76k3-hj1Uh-uxoOvyC1_x_g_4s3afYgChZ9yof3hNKal5yPXvSamBmRA2fqbANjdyxzhB2ZsJigAiOS-f8ULSG0koDVsk65wwOlxi=s728 1.5x, https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEiVOrx7So8VhwZf68OG0XjsU5OMjAFTePLH9eewCFmrtz2Pazz73NSnUNtaqG88r54R8LpT0ZFizohnJ_OaJ7_76k3-hj1Uh-uxoOvyC1_x_g_4s3afYgChZ9yof3hNKal5yPXvSamBmRA2fqbANjdyxzhB2ZsJigAiOS-f8ULSG0koDVsk65wwOlxi=s728 2x"},"classes":[]},{"id":32256,"url":"https:\/\/kalilinuxtutorials.com\/cloudgrappler\/","url_meta":{"origin":11267,"position":4},"title":"CloudGrappler &#8211; Elevating Cloud Security In AWS And Azure","author":"Varshini","date":"March 11, 2024","format":false,"excerpt":"CloudGrappler is a purpose-built tool designed for effortless querying of high-fidelity and single-event detections related to well-known threat actors in popular cloud environments such as AWS and Azure. Notes To optimize your utilization of CloudGrappler, we recommend using shorter time ranges when querying for results. This approach enhances efficiency and\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjohyoEj5sfvU7tLq4tYOQf1yAAEo8uTRa5cRAHuJpKwuxRaghY8Hgp9lFXt71UoVws9ID18AImeK55PR_N3qydfURUz1sn4D9qWMXGSy1uBEgD4LrwzQuvb4iet0sjmwBdxCmSAcVBE2AJHDUZgOEIApTb6jAUsoQPPBcZliHg-0ugf2bznqgiN1FJ3UiK\/s16000\/Awesome%20AppSec%20%281%29.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjohyoEj5sfvU7tLq4tYOQf1yAAEo8uTRa5cRAHuJpKwuxRaghY8Hgp9lFXt71UoVws9ID18AImeK55PR_N3qydfURUz1sn4D9qWMXGSy1uBEgD4LrwzQuvb4iet0sjmwBdxCmSAcVBE2AJHDUZgOEIApTb6jAUsoQPPBcZliHg-0ugf2bznqgiN1FJ3UiK\/s16000\/Awesome%20AppSec%20%281%29.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjohyoEj5sfvU7tLq4tYOQf1yAAEo8uTRa5cRAHuJpKwuxRaghY8Hgp9lFXt71UoVws9ID18AImeK55PR_N3qydfURUz1sn4D9qWMXGSy1uBEgD4LrwzQuvb4iet0sjmwBdxCmSAcVBE2AJHDUZgOEIApTb6jAUsoQPPBcZliHg-0ugf2bznqgiN1FJ3UiK\/s16000\/Awesome%20AppSec%20%281%29.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjohyoEj5sfvU7tLq4tYOQf1yAAEo8uTRa5cRAHuJpKwuxRaghY8Hgp9lFXt71UoVws9ID18AImeK55PR_N3qydfURUz1sn4D9qWMXGSy1uBEgD4LrwzQuvb4iet0sjmwBdxCmSAcVBE2AJHDUZgOEIApTb6jAUsoQPPBcZliHg-0ugf2bznqgiN1FJ3UiK\/s16000\/Awesome%20AppSec%20%281%29.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjohyoEj5sfvU7tLq4tYOQf1yAAEo8uTRa5cRAHuJpKwuxRaghY8Hgp9lFXt71UoVws9ID18AImeK55PR_N3qydfURUz1sn4D9qWMXGSy1uBEgD4LrwzQuvb4iet0sjmwBdxCmSAcVBE2AJHDUZgOEIApTb6jAUsoQPPBcZliHg-0ugf2bznqgiN1FJ3UiK\/s16000\/Awesome%20AppSec%20%281%29.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjohyoEj5sfvU7tLq4tYOQf1yAAEo8uTRa5cRAHuJpKwuxRaghY8Hgp9lFXt71UoVws9ID18AImeK55PR_N3qydfURUz1sn4D9qWMXGSy1uBEgD4LrwzQuvb4iet0sjmwBdxCmSAcVBE2AJHDUZgOEIApTb6jAUsoQPPBcZliHg-0ugf2bznqgiN1FJ3UiK\/s16000\/Awesome%20AppSec%20%281%29.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":28810,"url":"https:\/\/kalilinuxtutorials.com\/thundercloud\/","url_meta":{"origin":11267,"position":5},"title":"ThunderCloud : Cloud Exploit Framework","author":"R K","date":"April 19, 2023","format":false,"excerpt":"ThunderCloud is a Cloud Exploit Framework. Usage python3 tc.py -h _______ _ _ _____ _ _ |__ __| | | | \/ ____| | | | | | | |__ _ _ _ __ __| | ___ _ __| | | | ___ _ _ __| | | | |\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgPmvFDKg8UXPdSgsgmdnTnmiaVlp-1akIdYvSDGll_KLKZfiacoB0VG-Y16t74HmN5gTL-ZclhaRi97exi_jmsGuYQUtColFab86xjtYoQrS3XLjgCY3nhTJE2ftHcob7SauTJJpHiLabHPBtrvzKv7Wi4VN7NmJtfWxrQwrnZPTok7Z5U0qda-gMo\/s728\/kali%20temp%285%29.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgPmvFDKg8UXPdSgsgmdnTnmiaVlp-1akIdYvSDGll_KLKZfiacoB0VG-Y16t74HmN5gTL-ZclhaRi97exi_jmsGuYQUtColFab86xjtYoQrS3XLjgCY3nhTJE2ftHcob7SauTJJpHiLabHPBtrvzKv7Wi4VN7NmJtfWxrQwrnZPTok7Z5U0qda-gMo\/s728\/kali%20temp%285%29.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgPmvFDKg8UXPdSgsgmdnTnmiaVlp-1akIdYvSDGll_KLKZfiacoB0VG-Y16t74HmN5gTL-ZclhaRi97exi_jmsGuYQUtColFab86xjtYoQrS3XLjgCY3nhTJE2ftHcob7SauTJJpHiLabHPBtrvzKv7Wi4VN7NmJtfWxrQwrnZPTok7Z5U0qda-gMo\/s728\/kali%20temp%285%29.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgPmvFDKg8UXPdSgsgmdnTnmiaVlp-1akIdYvSDGll_KLKZfiacoB0VG-Y16t74HmN5gTL-ZclhaRi97exi_jmsGuYQUtColFab86xjtYoQrS3XLjgCY3nhTJE2ftHcob7SauTJJpHiLabHPBtrvzKv7Wi4VN7NmJtfWxrQwrnZPTok7Z5U0qda-gMo\/s728\/kali%20temp%285%29.png?resize=700%2C400&ssl=1 2x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/11267","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/comments?post=11267"}],"version-history":[{"count":0,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/11267\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media\/16476"}],"wp:attachment":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media?parent=11267"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/categories?post=11267"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/tags?post=11267"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}