Island Orchestration
https://tryhackme.com/room/islandorchestration
Flag
We start with basic nmap enumeration
nmap -sS -min-rate 5000 -p- --open -vvv -n -Pn IP

We discovered three open ports, now let's get a more detailed scan of those ports

We know port 8443 belongs to a kubernetes service and we can see in the scan that we don't have permission to access the api

Let's try port 80

We see there's a simple website but if we look around we can easily find a LFI vuln on the "page" parameter

Knowing there's a LFI vuln and we don't have access to the kubernetes API now we're gonna try to find a token or cert we can use to retrieve the info we need
We know the usual file for the token is the following one:
/var/run/secrets/kubernetes.io/serviceaccount/token
So let's check

We got the token, if we decode we find useful information

Now that we have the token we can still enumerating:

The secrets file seems like a good place to hide a flag. Let's see what's inside.
curl -v -H "Authorization: Bearer $TOKEN" https://10.10.236.232:8443/api/v1/namespaces/default/secrets/ -k

We found. Now the only thing we have to do is decode it.

Last updated
Was this helpful?