Tags
Language
Tags
January 2025
Su Mo Tu We Th Fr Sa
29 30 31 1 2 3 4
5 6 7 8 9 10 11
12 13 14 15 16 17 18
19 20 21 22 23 24 25
26 27 28 29 30 31 1
Attention❗ To save your time, in order to download anything on this site, you must be registered 👉 HERE. If you do not have a registration yet, it is better to do it right away. ✌

( • )( • ) ( ͡⚆ ͜ʖ ͡⚆ ) (‿ˠ‿)
SpicyMags.xyz

Kubernetes Hacking For Beginners

Posted By: ELK1nG
Kubernetes Hacking For Beginners

Kubernetes Hacking For Beginners
Published 1/2025
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 245.49 MB | Duration: 0h 40m

The ultimate guide to learn how to run a pentest on a kubernetes environment

What you'll learn

Understand the fundamental security concepts in Kubernetes architecture

Identify common security risks and vulnerabilities in Kubernetes deployments, such as exposed dashboards, default configurations, and commonly misconfiguration

Recognize and explain basic Kubernetes security best practices, including the principle of least privilege, namespace isolation

Identify attacks scenarios, define a scope, and create a testing plan

Requirements

Basic security principle and pentesting

Description

This comprehensive course bridges the gap between Kubernetes fundamentals and security testing, designed for security enthusiasts and penetration testers who want to expand their skillset into cloud-native environments. You'll learn how to identify, assess, and exploit security vulnerabilities in Kubernetes clusters through hands-on exercises and practical scenarios.The course begins with essential Kubernetes concepts, including pods, services, deployments, and networking, providing you with the foundational knowledge needed to understand the attack surface. You'll learn how to set up your own testing environment using tools like Minikube or Kind, ensuring you can practice safely and independently.As you progress, you'll discover common misconfigurations and security weaknesses in Kubernetes deployments, such as:Exposed Kubernetes dashboards and API serversMisconfigured RBAC permissionsContainer escape techniquesSecrets management vulnerabilitiesNetwork policy gapsThe course emphasizes practical skills with guided laboratories where you'll learn to:Use security assessment tools specific to Kubernetes environmentsPerform reconnaissance on cluster componentsExploit service account tokens and credentialsEscalate privileges within the clusterMove laterally between namespaces and podsIdentify and exploit vulnerable workloadsSpecial attention is given to defensive considerations, helping you understand how to document findings and provide actionable remediation advice. By the end of the course, you'll have the skills to independently conduct security assessments of Kubernetes clusters and provide valuable insights for hardening these environments.Prerequisites include basic familiarity with Linux commands and container concepts. All necessary tools and techniques will be thoroughly explained, making this course accessible to security practitioners beginning their journey into container orchestration security.

Overview

Section 1: Introduction

Lecture 1 Introduction

Section 2: K8S key components

Lecture 2 K8S Architecture - Objects

Lecture 3 Demo Architecture

Lecture 4 Networking

Lecture 5 Security

Section 3: Pentest preparation

Lecture 6 Define your scope and identify threats

Section 4: Pentest Execution

Lecture 7 Discovery / Enumeration

Lecture 8 Exploitation Demo

Lecture 9 Persistence

Section 5: Conclusion

Lecture 10 Recap

Any security actor curious about security in kubernetes or pentester to develop their skills on kubernetes