Skip to content

Latest commit

 

History

History

2023-cncf-ctf-walkthroughs

2023 Cloud Native Computing Foundation - Capture the Flag (CTF) Scenarios

2023 Capture the Flag Scenarios

ControlPlane has developed 9 CTF Scenarios for the Cloud Native Computing Foundation (CNCF) providing hands-on experience of containers, Kubernetes and CI/CD infrastructure. The scenarios are designed to teach the participants about the how cloud native services work, the impact of vulnerable resources and how to remediate issues.

Scenario Description

The table below outlines each scenario, learning objectives, technology used and the difficulty.

Scenario Scenario ID Scenario Description Learning Objective Technology Used Difficulty No of Flags
Seven Seas seven-seas Sail the Seven Seas, find all the missing map pieces and plunder the Royal Fortune Kubernetes Fundamentals, Container Enumeration and Exploitation Kubernetes Secrets, Container Images, Pod Security Standards, Network Policy, Pod Logs, Service Accounts and RBAC, Sidecar Containers Easy 2
Commandeer Container commandeer-container Use Kubernetes to smuggle aboard and find the hidden treasure Accessing containers without kubectl exec Kubernetes Secrets, Container Images, Service Accounts and RBAC Easy 1
CI Runner Next-Generation Breakout ci-runner-ng-breakout An adversary has exploited CI runner and reached the underlying host. Can you find out how? Container breakout via containerd Docker, Containerd Easy 1
PSS Misconfiguration pss-misconfiguration In the transition away from Pod Security Policy an adversary has deployed a malicious workload which resists removal. Unravel the mystery and remove the workload off the cluster Pod Security Standards, Pod Security Admission Pod Security Standards, Pod Security Admission Medium 3
Build a Backdoor build-a-backdoor Install a backdoor onto a Kubernetes cluster for Captain Hλ$ħ𝔍Ⱥ¢k to exploit Kubernetes Ingress, Services and Network Policies Kubernetes Ingress, Services, Network Policies, Kyverno Medium 2
Cease and Desist cease-and-desist Fix the reform-kube licensing server and get production running again Cilium Network Policies Kubernetes Secrets, Cilium Network Policies Medium 2
Devious Developer Data Dump devious-developer-data-dump Exploit a public repository to access a production environment and steal sensitive data From secret discovery in a code repository to full cluster compromise Gitea, GitHub Action Runners, Zot, SQL Database Complex 2
Identity Theft identity-theft Exploit a public facing application, obtain a foothold on the cluster and access a secret store Realistic adversary behaviour and OIDC token abuse custom vulnerable application (pod schema validation), Dex, Kubernetes Services, Service Accounts and RBAC Complex 2
Coastline Cluster Attack coastline-cluster-attack Pivot across multiple systems, escalate privileges and obtain full cluster compromise Leveraging ephemeral containers for initial access, service account enumeration and privilege escalation, service account token abuse, vulnerable daemonsets Ephemeral containers, Service Accounts and RBAC, Service Account Tokens, Custom "red herring" applications, Elasticsearch, Fluentbit Daemonsets Complex 3

Difficulty Rating

Easy - A person with limited Kubernetes knowledge and is able to research how technology works, can complete these scenarios

Medium - More challenging scenarios which require a greater understanding or experience of technology and to problem solve

Complex - These are the most challenging scenarios, very little breadcrumbs are given and requires pre-existing knowledge or deep research to be conducted to complete