Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Detected by https://github.com/samokat-oss/pisc #2

Open
kapistka opened this issue Apr 6, 2024 · 2 comments
Open

Detected by https://github.com/samokat-oss/pisc #2

kapistka opened this issue Apr 6, 2024 · 2 comments

Comments

@kapistka
Copy link

kapistka commented Apr 6, 2024

We need to come up with bypass =)
sample

@r0binak
Copy link
Owner

r0binak commented Apr 6, 2024

@kapistka It's not really a big problem. If the attacker has the ability to prepare his own image, he can easily bypass these checks. I've done some simple tests and I'm ready to give a couple of examples:

  • Bypass malicious compliance checks. All values are hardcoded. There are many ways how you can obfuscate a bash script/path. The simplest of them is using "?", "*" symbols. So you can use rm -rf /v*r/l*b/a*t/lists/* instead rm -rf /var/lib/apt/lists/* construction.
Снимок экрана 2024-04-07 в 01 28 55
  • What about malicious files detected by VirusTotal? All files that VirusTotal recognised as malicious are open source tools. In order for an executable file not to be detected by VT, it is enough to change only a byte. This in turn changes the hash and the malware is not recognised. An attacker can use a custom build of these tools.

  • You can change creation date via manifest.json

@kapistka
Copy link
Author

kapistka commented Apr 8, 2024

@r0binak Thanks for the reply)

  1. Path obfuscation is a good point, but malicious compliance is not interesting for the attacker, because it bypasses only the vulnerability scanner. It is more interesting to bypass CVE-2024-21626.
  2. To bypass virustotal, I would suggest using encryption, like here.
  3. The creation date is not interesting for the attacker. This is used against the laziness of developers to download a more recent image.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants