Kubernetes Hacking: From Weak Applications to Cluster Control
Vložit
- čas přidán 17. 04. 2023
- j-h.io/sysdig || Use Sysdig to keep your runtime environments secure, across Kubernetes clusters, the CI/CD pipeline, and your production environment! j-h.io/sysdig
🔥 CZcams ALGORITHM ➡ Like, Comment, & Subscribe!
🙏 SUPPORT THE CHANNEL ➡ jh.live/patreon
🤝 SPONSOR THE CHANNEL ➡ jh.live/sponsor
🌎 FOLLOW ME EVERYWHERE ➡ jh.live/discord ↔ jh.live/twitter ↔ jh.live/linkedin ↔ jh.live/instagram ↔ jh.live/tiktok
💥 SEND ME MALWARE ➡ jh.live/malware
I need to buy glasses, that's probably this guy's superpower
Great topic, especially in this time and age very cool to see container vulnerabilities in action
Great video John ! As always !
Trick with --path-as-is is super cool ! Currently working with containers and kubernates from a dev perspective but this video brings new point of view for me ! Thanks :)
What a fantastic video congratulations as always
Thank you for your walkthrough, May God bless you 🎭
love your high quality videos
Some pro-tips for the messed up terminal.
Very nice tutorial thanks for sharing. You could have also edited the grafana pod using "kubectl edit grafana pod" and make it previleged pod and mount host directory instead of creating new pod..
I like his style when he starts intro speaking it’s like a documentary 😂
Excellent!
wild video😂 nice, thanks john for it
Another awesome video thank you very much
bruh, love it. makes me wanna learn these stuff
Especially for ones interested in technologies like k8s in the security context, I can recommend the book from sparc flow "How to hack like a ghost"
Kubernetes will ignore the imagePullPolicy and will always try to pull the image if the image tag is :latest (or none, defaulting to :latest)
Very nice video. Thanks a lot
this guy deserves a million subs + more
thanks buddy this was basically a step by step guide for discovering major vulnerability in a popular service by pure accident. got me bug bounty money :D
awesome, more like this