tgoop.com/it_secur/646
Last Update:
• The Kubernetes Goat is designed to be an intentionally vulnerable cluster environment to learn and practice Kubernetes security;
• Sensitive keys in codebases;
• DIND (docker-in-docker) exploitation;
• SSRF in the Kubernetes (K8S) world;
• Container escape to the host system;
• Docker CIS benchmarks analysis;
• Kubernetes CIS benchmarks analysis;
• Attacking private registry;
• NodePort exposed services;
• Helm v2 tiller to PwN the cluster;
• Analyzing crypto miner container;
• Kubernetes namespaces bypass;
• Gaining environment information;
• DoS the Memory/CPU resources;
• Hacker container preview;
• Hidden in layers;
• RBAC least privileges misconfiguration;
• KubeAudit - Audit Kubernetes clusters;
• Falco - Runtime security monitoring & detection;
• Popeye - A Kubernetes cluster sanitizer;
• Secure network boundaries using NSP;
• Cilium Tetragon - eBPF-based Security Observability and Runtime Enforcement;
• Securing Kubernetes Clusters using Kyverno Policy Engine.
• https://github.com/madhuakula/kubernetes-goat
#Kubernetes #security