Kubernetes Penetration Testing – Part Two
Thanks for watching! You can access the full Kubernetes lab setup and download files using the link below: https://buymeacoffee.com/offensiveopslabs/e/531485 In this video, we show how to escalate from a compromised container to full Worker Node access using Docker socket abuse. We explain the risks of an exposed /var/run/docker.sock, demonstrate how to exploit it with the Docker CLI, and launch a container with host filesystem access. Read the blog walkthrough here: https://www.rbtsec.com/blog/kubernetes-pentesting-part-two/ Watch Next: https://youtube.com/playlist?list=PLUMEY7cBcvDMBeAK8RbJ00VHCIZkQcTV1&si=TVczB-ly_e1GgRfY Follow Us: LinkedIn: https://www.linkedin.com/company/rbtsecurity/ Twitter: https://twitter.com/RBTSecurity Facebook: https://www.facebook.com/RBTSecur1ty/ Contact Us: For business inquiries and collaborations, please email us at [email protected] Educational Disclaimer: All content is intended for educational purposes only, to promote ethical hacking and security research. #Kubernetes #Pentesting #ContainerSecurity #CloudSecurity #RBTSecurity #CyberSecurity #Hacking
Download
0 formatsNo download links available.