kubectf
所属分类:系统/网络安全
开发工具:Shell
文件大小:0KB
下载次数:0
上传日期:2020-12-12 04:48:40
上 传 者:
sh-1993
说明: Kubernetes首席技术官,
(Kubernetes CTF,)
文件列表:
docs/ (0, 2020-12-11)
docs/requirements.ja.md (496, 2020-12-11)
docs/requirements.md (329, 2020-12-11)
docs/setup.ja.md (606, 2020-12-11)
docs/setup.md (547, 2020-12-11)
manifests/ (0, 2020-12-11)
manifests/00_namespaces/ (0, 2020-12-11)
manifests/00_namespaces/namespace.yml (455, 2020-12-11)
manifests/01_challenges/ (0, 2020-12-11)
manifests/01_challenges/can-you-keep-a-secret/ (0, 2020-12-11)
manifests/01_challenges/can-you-keep-a-secret/flag.yaml (181, 2020-12-11)
manifests/01_challenges/can-you-keep-a-secret/victim.yaml (610, 2020-12-11)
manifests/01_challenges/mountme/ (0, 2020-12-11)
manifests/01_challenges/mountme/job-sa.yaml (706, 2020-12-11)
manifests/01_challenges/mountme/victim.yaml (422, 2020-12-11)
manifests/01_challenges/mountme2/ (0, 2020-12-11)
manifests/01_challenges/mountme2/flag/ (0, 2020-12-11)
manifests/01_challenges/mountme2/flag/FLAG.txt (49, 2020-12-11)
manifests/01_challenges/mountme2/job-sa.yaml (790, 2020-12-11)
manifests/01_challenges/mountme2/victim.yaml (423, 2020-12-11)
manifests/01_challenges/sniff/ (0, 2020-12-11)
manifests/01_challenges/sniff/client.yaml (466, 2020-12-11)
manifests/01_challenges/sniff/server.yaml (289, 2020-12-11)
manifests/01_challenges/sniff/service.yml (129, 2020-12-11)
manifests/01_challenges/sniff/victim.yaml (337, 2020-12-11)
manifests/01_challenges/treasure-hunt/ (0, 2020-12-11)
manifests/01_challenges/treasure-hunt/docker-registry/ (0, 2020-12-11)
manifests/01_challenges/treasure-hunt/docker-registry/certs/ (0, 2020-12-11)
... ...
# kubectf
# Requirements
* minikube
* kubectl
* Docker Engine
* Add `{ "insecure-registries": ["docker.for.mac.localhost:5000"] }` to Docker configuration.
more information [docs/requirements.md](https://github.com/mrtc0/kubectf/blob/master/docs/requirements.md)
# Getting Started
```shell
$ minikube start --driver=virtualbox
$ ./setup.sh
```
# Rule
Assuming you've penetrated a vulnerable Pod, perform a privilege escalation and look for a Flag (a string of the format `k8sctf{...}` ).
There is a victim pod in the namespace for each problem, and you enter into this pod to challenge the problem.
No changes should be made to anifests. You should work within Pod as a attacker.
```shell
$ kubens mountme
kubectl get pods
NAME READY STATUS RESTARTS AGE
victim-7c5745b4dc-jxd5t 1/1 Running 0 14m
kubectl exec -it victim-7c5745b4dc-jxd5t bash
I have no name!@victim-7c5745b4dc-jxd5t:/$
```
# Challenges
| Title | Difficulty | Description |
|:-----:|:---------:|:----------:|
| Mount me | | [Link](https://github.com/mrtc0/kubectf/blob/master/manifests/01_challenges/mountme/README.md) |
| Can You Keep A Secret? | | [Link](https://github.com/mrtc0/kubectf/blob/master/manifests/01_challenges/can-you-keep-a-secret/README.md) |
| Treasure Hunt | | [Link](https://github.com/mrtc0/kubectf/blob/master/manifests/01_challenges/treasure-hunt/README.md) |
| Mount me 2 | | [Link](https://github.com/mrtc0/kubectf/blob/master/manifests/01_challenges/mountme2/README.md) |
| Sniff | | [Link](https://github.com/mrtc0/kubectf/blob/master/manifests/01_challenges/sniff/README.md) |
# Writeups
TBD
近期下载者:
相关文件:
收藏者: