[Snort-sigs] Kubernetes kubelet API

Y M snort at outlook.com
Mon May 7 13:03:43 EDT 2018


Hi,

The first rule addresses the unauthenticated read-only HTTP access potentially disclosing sensitive information about pods. The second rule address the remote execution attempts over the HTTPS read/write port. No pcaps available.

# --------------------
# Date: 2018-05-06
# Title: Analysis of a Kubernetes hack — Backdooring through kubelet
# Reference: https://medium.com/handy-tech/analysis-of-a-kubernetes-hack-backdooring-through-kubelet-823be5c3d67c
# Tests: syntax only

alert tcp $EXTERNAL_NET any -> $HOME_NET [10250,10255] (msg:"SERVER-OTHER Kubernetes kubelet API read-only pods information access attempt"; flow:to_server,established; content:"GET"; http_method; content:"/pods"; fast_pattern:only; http_uri; reference:url,medium.com/handy-tech/analysis-of-a-kubernetes-hack-backdooring-through-kubelet-823be5c3d67c; classtype:attempted-admin; sid:8000039; rev:1;)

alert tcp $EXTERNAL_NET any -> $HOME_NET [10250,10255] (msg:"SERVER-OTHER Kubernetes kubelet API pod remote execution attempt"; flow:to_server,established; content:"POST"; http_method; content:"/exec/"; fast_pattern:only; http_uri; content:"?command="; http_uri; reference:url,medium.com/handy-tech/analysis-of-a-kubernetes-hack-backdooring-through-kubelet-823be5c3d67c; classtype:attempted-admin; sid:8000040; rev:1;)

Thanks.
YM
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.snort.org/pipermail/snort-sigs/attachments/20180507/7ada486c/attachment-0001.html>


More information about the Snort-sigs mailing list