madhuakula / kubernetes-goat

Kubernetes Goat is a "Vulnerable by Design" cluster environment to learn and practice Kubernetes security using an interactive hands-on playground 🚀
https://madhuakula.com/kubernetes-goat
MIT License
4.39k stars 709 forks source link

404 Response for madhuakula.com URL #43

Closed adamhurm closed 2 years ago

adamhurm commented 2 years ago

Hi Madhu!

First off, thanks for creating this awesome project. I am currently trying to deploy it locally on my raspberry pi k3s cluster, so I was looking into the image files that were used.

When I checked some of the Dockerfiles, I noticed that infrastructure/batch-check/Dockerfile contains a reference to https://madhuakula.com/kubernetes-goat/k8s-goat-a5e0a28fa75bf429123943abedb065d1, which is currently getting a 404 response. Screenshot 2022-05-05 183313

Would you be able to look into this? Thanks!

madhuakula commented 2 years ago

Hi @adamhurm

Thank you so much for your kind words 🙌

Yes, great to see you are trying this on K3S 🥳 (I think currently the container images don't support ARM architecture believe). I am working on fixing this and releasing it in the coming week.

So regarding the https://madhuakula.com/kubernetes-goat/k8s-goat-a5e0a28fa75bf429123943abedb065d1 is just a trick/trap which is to showcase in the scenario saying that it's generally how in real-world attackers leveraged crypto mining and they build container images and push directly to docker hub without Dockerfile reference.

When people don't analyze them (basically the below layers) they are running some unknown code/scripts. So this is just intended and testing purpose only to showcase this example. There is no content in that URL/endpoint (I wish I can plant some backdoors 😉)

Thank you once again and let me know if you need any other help :)