<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Kubernetes Test Malware in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/kubernetes-test-malware/m-p/577226#M115844</link>
    <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/315665"&gt;@prashansa_goel&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You can try uploading it to the Wildfire portal for analysis:&amp;nbsp;&lt;A href="https://wildfire.paloaltonetworks.com/wildfire/dashboard" target="_blank"&gt;https://wildfire.paloaltonetworks.com/wildfire/dashboard&lt;/A&gt;&amp;nbsp;. What type of file is it?&lt;/P&gt;</description>
    <pubDate>Wed, 14 Feb 2024 05:32:01 GMT</pubDate>
    <dc:creator>JayGolf</dc:creator>
    <dc:date>2024-02-14T05:32:01Z</dc:date>
    <item>
      <title>Kubernetes Test Malware</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/kubernetes-test-malware/m-p/577189#M115838</link>
      <description>&lt;P&gt;Is there a way to test a sample malware file on Kubernetes? I know that in windows servers we can test it out using wild fire file.&lt;/P&gt;</description>
      <pubDate>Tue, 13 Feb 2024 21:26:04 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/kubernetes-test-malware/m-p/577189#M115838</guid>
      <dc:creator>prashansa_goel</dc:creator>
      <dc:date>2024-02-13T21:26:04Z</dc:date>
    </item>
    <item>
      <title>Re: Kubernetes Test Malware</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/kubernetes-test-malware/m-p/577226#M115844</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/315665"&gt;@prashansa_goel&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You can try uploading it to the Wildfire portal for analysis:&amp;nbsp;&lt;A href="https://wildfire.paloaltonetworks.com/wildfire/dashboard" target="_blank"&gt;https://wildfire.paloaltonetworks.com/wildfire/dashboard&lt;/A&gt;&amp;nbsp;. What type of file is it?&lt;/P&gt;</description>
      <pubDate>Wed, 14 Feb 2024 05:32:01 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/kubernetes-test-malware/m-p/577226#M115844</guid>
      <dc:creator>JayGolf</dc:creator>
      <dc:date>2024-02-14T05:32:01Z</dc:date>
    </item>
    <item>
      <title>Re: Kubernetes Test Malware</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/kubernetes-test-malware/m-p/577355#M115864</link>
      <description>&lt;P&gt;I meant is there a way to test that the agent installed on the Kubernetes node is working fine by dropping any test malware file on the node?&lt;/P&gt;</description>
      <pubDate>Thu, 15 Feb 2024 15:44:36 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/kubernetes-test-malware/m-p/577355#M115864</guid>
      <dc:creator>prashansa_goel</dc:creator>
      <dc:date>2024-02-15T15:44:36Z</dc:date>
    </item>
    <item>
      <title>Re: Kubernetes Test Malware</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/kubernetes-test-malware/m-p/1221012#M123328</link>
      <description>&lt;P&gt;You can create a common Ubuntu deployment in your Kubernetes cluster, and then interactively logon to it by using&amp;nbsp;&amp;nbsp;&lt;SPAN&gt;kubectl exec -n &amp;lt;name space here&amp;gt; &amp;lt;pod-name&amp;gt; -it -- /bin/sh&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Once you logon, you can download the malware or Eicar file to test it out.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;FYI - we tested it, and it allows the file to be downloaded, the file does not get removed at the download time. At the execution of the file, it find it as malicious and delete.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 19 Feb 2025 21:57:14 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/kubernetes-test-malware/m-p/1221012#M123328</guid>
      <dc:creator>AAnsari</dc:creator>
      <dc:date>2025-02-19T21:57:14Z</dc:date>
    </item>
  </channel>
</rss>

