Advent of Cyber 2024 Day 22: It’s because I’m kubed, isn’t it?

Lab link.

Questions

1. What is the name of the webshell that was used by Mayor Malware?

The Kubernetes cluster is started using Minikube. The output shows that the cluster has been successfully started and configured by default. We check the status of the pods running in the ‘wareville’ namespace. It may be necessary to check a few times. We notice that a command has been executed in the pod.

Investigate Logs:

Then, to check the Apache access logs, the command cat /var/log/apache2/access.log is entered. One particular entry stands out in the logs: GET /shelly.php?cmd=whoami.

2. What file did Mayor Malware read from the pod?

3. What tool did Mayor Malware search for that could be used to create a remote connection from the pod?

4. What IP connected to the docker registry that was unexpected?

5. At what time is the first connection made from this IP to the docker registry?

6. At what time is the updated malicious image pushed to the registry?

7. What is the value stored in the “pull-creds” secret?

Bir yanıt yazın

E-posta adresiniz yayınlanmayacak. Gerekli alanlar * ile işaretlenmişlerdir