kubectf

所属分类:系统/网络安全
开发工具:Shell
文件大小:0KB
下载次数:0
上传日期:2020-12-12 04:48:40
上 传 者sh-1993
说明:  Kubernetes首席技术官,
(Kubernetes CTF,)

文件列表:
docs/ (0, 2020-12-11)
docs/requirements.ja.md (496, 2020-12-11)
docs/requirements.md (329, 2020-12-11)
docs/setup.ja.md (606, 2020-12-11)
docs/setup.md (547, 2020-12-11)
manifests/ (0, 2020-12-11)
manifests/00_namespaces/ (0, 2020-12-11)
manifests/00_namespaces/namespace.yml (455, 2020-12-11)
manifests/01_challenges/ (0, 2020-12-11)
manifests/01_challenges/can-you-keep-a-secret/ (0, 2020-12-11)
manifests/01_challenges/can-you-keep-a-secret/flag.yaml (181, 2020-12-11)
manifests/01_challenges/can-you-keep-a-secret/victim.yaml (610, 2020-12-11)
manifests/01_challenges/mountme/ (0, 2020-12-11)
manifests/01_challenges/mountme/job-sa.yaml (706, 2020-12-11)
manifests/01_challenges/mountme/victim.yaml (422, 2020-12-11)
manifests/01_challenges/mountme2/ (0, 2020-12-11)
manifests/01_challenges/mountme2/flag/ (0, 2020-12-11)
manifests/01_challenges/mountme2/flag/FLAG.txt (49, 2020-12-11)
manifests/01_challenges/mountme2/job-sa.yaml (790, 2020-12-11)
manifests/01_challenges/mountme2/victim.yaml (423, 2020-12-11)
manifests/01_challenges/sniff/ (0, 2020-12-11)
manifests/01_challenges/sniff/client.yaml (466, 2020-12-11)
manifests/01_challenges/sniff/server.yaml (289, 2020-12-11)
manifests/01_challenges/sniff/service.yml (129, 2020-12-11)
manifests/01_challenges/sniff/victim.yaml (337, 2020-12-11)
manifests/01_challenges/treasure-hunt/ (0, 2020-12-11)
manifests/01_challenges/treasure-hunt/docker-registry/ (0, 2020-12-11)
manifests/01_challenges/treasure-hunt/docker-registry/certs/ (0, 2020-12-11)
... ...

# kubectf # Requirements * minikube * kubectl * Docker Engine * Add `{ "insecure-registries": ["docker.for.mac.localhost:5000"] }` to Docker configuration. more information [docs/requirements.md](https://github.com/mrtc0/kubectf/blob/master/docs/requirements.md) # Getting Started ```shell $ minikube start --driver=virtualbox $ ./setup.sh ``` # Rule Assuming you've penetrated a vulnerable Pod, perform a privilege escalation and look for a Flag (a string of the format `k8sctf{...}` ). There is a victim pod in the namespace for each problem, and you enter into this pod to challenge the problem. No changes should be made to anifests. You should work within Pod as a attacker. ```shell $ kubens mountme kubectl get pods NAME READY STATUS RESTARTS AGE victim-7c5745b4dc-jxd5t 1/1 Running 0 14m kubectl exec -it victim-7c5745b4dc-jxd5t bash I have no name!@victim-7c5745b4dc-jxd5t:/$ ``` # Challenges | Title | Difficulty | Description | |:-----:|:---------:|:----------:| | Mount me | | [Link](https://github.com/mrtc0/kubectf/blob/master/manifests/01_challenges/mountme/README.md) | | Can You Keep A Secret? | | [Link](https://github.com/mrtc0/kubectf/blob/master/manifests/01_challenges/can-you-keep-a-secret/README.md) | | Treasure Hunt | | [Link](https://github.com/mrtc0/kubectf/blob/master/manifests/01_challenges/treasure-hunt/README.md) | | Mount me 2 | | [Link](https://github.com/mrtc0/kubectf/blob/master/manifests/01_challenges/mountme2/README.md) | | Sniff | | [Link](https://github.com/mrtc0/kubectf/blob/master/manifests/01_challenges/sniff/README.md) | # Writeups TBD

近期下载者

相关文件


收藏者