To access material, start machines and answer questions login.
Make sure to wait 5 minutes after the machine starts up before starting recon.
Containers are really cool, but they have security considerations just like everything else. Break into the box and then figure out how to get root access!
This box will require some research into how to use microk8s.
Our story so far....
Two developers are venturing into the world of Kubernetes. Little do these developers know that their lack of understanding in 'k8s', containers, and git has left their resources open to exploitation!
What did frank leave exposed on the site?
What is the user.txt flag?
What is the root.txt flag?
Created by
Room Type
Free Room. Anyone can deploy virtual machines in the room (without being subscribed)!
Users in Room
2,174
Created
1383 days ago
Ready to learn Cyber Security? Create your free account today!
TryHackMe provides free online cyber security training to secure jobs & upskill through a fun, interactive learning environment.
Already have an account? Log in