Compromised Kubernetes binaries could be used to gain access to your systems. In this lab, you will mitigate this threat by verifying these binaries before they are executed.
Successfully complete this lab by achieving the following learning objectives:
- Locate and Download the Checksums for the Binary Files
The binary files are located in
Your coworker has left the version number they used in a file called
version.txt. Check this file for the version number. Don’t try to check the version by running any of the binaries before you have verified them (e.g., with a command like
kubectl version)! All of the binaries are the same version.
Use the version number to download the correct checksum file for each of the binary files. Download the checksums to the same directory the binaries are located in (
- Verify the Binaries and Delete Any That May Contain Malicious Code
Use the checksums to verify all of the binaries contained in
Delete any binary files that fail checksum verification, as they could contain malicious code.