Post

Kuber

Kuber

CHALLENGE DESCRIPTION

As a digital forensics investigator, you received an urgent request from a client managing multiple proxy Kubernetes clusters. The client reports unusual behavior in one of their development environments, where they were testing a proxy via SSH. This environment was exposed to the internet, raising concerns about a potential security breach. You have been provided with a dump of the kube-system namespace, as most of the testing activity occurred there. Your task is to thoroughly analyze the data and determine if the system has been compromised.

SOLUTION

At which NodePort is the ssh-deployment Kubernetes service exposed for external access?

1
grep -i nodeport *
Answer 31337

What is the ClusterIP of the kubernetes cluster?

1
grep -i ClusterIP * 
Answer 10.43.191.212

What is the flag value inside ssh-config configmap?

1
grep -i htb{ *
Answer HTB{1d2d2b861c5f8631f841b57f327f46f8}

What is the value of password (in plaintext) which is found inside ssh-deployment via secret?

1
grep -i password *

We will get base64 encoding password.

Answer SuperCrazyPassword123!

What is the name of the malicious pod?

1
grep -a5 -i 'pod' pods.yaml

Scroll down and we can see something like command.

Answer metrics-server-557ff575fx-4q62x

What is the image attacker is using to create malicious pod?

Answer alpine

Whats the attacker IP?

Answer 10.10.14.11