Introduction
You’ve hacked into a low-privileged AWS EKS pod. Use the web terminal below to find flags across the environment. Each challenge runs in a different Kubernetes namespaces with varying permissions.
All K8s resources are crucial; challenges are based on real EKS misconfigurations and security issues.
Click “Begin Challenge” on your desktop, and for guidance, click the question mark icon for useful cheat sheet.
Good luck!
Overview
There are 5 challenges in total. Each challenge can only be attempted when previous challenge is solved.
Challenge #1: Secret Seeker
Scenario
Jumpstart your quest by listing all the secrets in the cluster. Can you spot the flag among them?
Walkthrough
The challenge title is pretty much self-explanatory whereby we are asked to retrieve a secret in this cluster. So let’s get started!
Every challenge page has this button - “View Permission”. This allows us to view permissions granted to the current service account.
For this challenge, we are granted with read secret permission:
|
|
Before we start solving the challenge, let’s look at the kube configuration:
|
|
The cluster is named localcfg
and the default namespace for user - user
is challenge1
namespace. Now we can run the following command to get secrets in this namespace.
|
|
We can see log-rotate
secret and let’s dump out the secret content.
|
|
Awesome! That is the flag for challenge #1. Now we can move on to the next challenge.