Thanks for watching! You can access the full Kubernetes lab setup and download files using the link below: https://buymeacoffee.com/offensiveopslabs/e/531485
In this video, we will demonstrate how a single Role-Based Access Control (RBAC) misconfiguration can lead to full cluster compromise by abusing the RBAC weaknesses and deploying a simple malicious pod to escalate privileges and take over the master node.
Read the blog walkthrough here: https://www.rbtsec.com/blog/kubernetes-penetration-testing-part-four-exploiting-rbac-misconfigurations-for-master-node-compromise/
Follow Us:
LinkedIn: https://www.linkedin.com/company/rbtsecurity/
Twitter: https://twitter.com/RBTSecurity
Facebook: https://www.facebook.com/RBTSecur1ty/
GitHub: https://github.com/rbtsecurity/
Contact Us:
For business inquiries and collaborations, please email us at [email protected]
Educational Disclaimer:
All content is intended for educational purposes only, to promote ethical hacking and security research.
#Kubernetes #Pentesting #ContainerSecurity #CloudSecurity #RBTSecurity #CyberSecurity #Hacking