Compromised Kubernetes binaries could be used to gain access to your systems. In this lab, you will mitigate this threat by verifying these binaries before they are executed.
Learning Objectives
Successfully complete this lab by achieving the following learning objectives:
- Locate and Download the Checksums for the Binary Files
The binary files are located in
/home/cloud_user/k8s-binaries/
.Your coworker has left the version number they used in a file called
version.txt
. Check this file for the version number. Don’t try to check the version by running any of the binaries before you have verified them (e.g., with a command likekubectl version
)! All of the binaries are the same version.Use the version number to download the correct checksum file for each of the binary files. Download the checksums to the same directory the binaries are located in (
/home/cloud_user/k8s-binaries/
).- Verify the Binaries and Delete Any That May Contain Malicious Code
Use the checksums to verify all of the binaries contained in
/home/cloud_user/k8s-binaries/
.Delete any binary files that fail checksum verification, as they could contain malicious code.