r0binak / MTKPI

🧰 Multi Tool Kubernetes Pentest Image
MIT License
209 stars 16 forks source link

Detected by https://github.com/samokat-oss/pisc #2

Open kapistka opened 5 months ago

kapistka commented 5 months ago

We need to come up with bypass =) sample

r0binak commented 5 months ago

@kapistka It's not really a big problem. If the attacker has the ability to prepare his own image, he can easily bypass these checks. I've done some simple tests and I'm ready to give a couple of examples:

Снимок экрана 2024-04-07 в 01 28 55
kapistka commented 5 months ago

@r0binak Thanks for the reply)

  1. Path obfuscation is a good point, but malicious compliance is not interesting for the attacker, because it bypasses only the vulnerability scanner. It is more interesting to bypass CVE-2024-21626.
  2. To bypass virustotal, I would suggest using encryption, like here.
  3. The creation date is not interesting for the attacker. This is used against the laziness of developers to download a more recent image.