Kubernetes Hacking: From Weak Applications to Cluster Control

Sdílet
Vložit
  • čas přidán 17. 04. 2023
  • j-h.io/sysdig || Use Sysdig to keep your runtime environments secure, across Kubernetes clusters, the CI/CD pipeline, and your production environment! j-h.io/sysdig
    🔥 CZcams ALGORITHM ➡ Like, Comment, & Subscribe!
    🙏 SUPPORT THE CHANNEL ➡ jh.live/patreon
    🤝 SPONSOR THE CHANNEL ➡ jh.live/sponsor
    🌎 FOLLOW ME EVERYWHERE ➡ jh.live/discord ↔ jh.live/twitter ↔ jh.live/linkedin ↔ jh.live/instagram ↔ jh.live/tiktok
    💥 SEND ME MALWARE ➡ jh.live/malware

Komentáře • 68

  • @Quephara
    @Quephara Před rokem +53

    I need to buy glasses, that's probably this guy's superpower

  • @einpseudonym7604
    @einpseudonym7604 Před rokem +29

    Great topic, especially in this time and age very cool to see container vulnerabilities in action

  • @exoric7408
    @exoric7408 Před rokem

    Great video John ! As always !

  • @janwrona9539
    @janwrona9539 Před rokem +6

    Trick with --path-as-is is super cool ! Currently working with containers and kubernates from a dev perspective but this video brings new point of view for me ! Thanks :)

  • @scorpion_lux
    @scorpion_lux Před rokem

    What a fantastic video congratulations as always

  • @hack_well
    @hack_well Před rokem

    Thank you for your walkthrough, May God bless you 🎭

  • @manonmission2010

    love your high quality videos

  • @kebien6020
    @kebien6020 Před rokem +2

    Some pro-tips for the messed up terminal.

  • @vivekmishra69
    @vivekmishra69 Před rokem

    Very nice tutorial thanks for sharing. You could have also edited the grafana pod using "kubectl edit grafana pod" and make it previleged pod and mount host directory instead of creating new pod..

  • @justchecking2470
    @justchecking2470 Před rokem +1

    I like his style when he starts intro speaking it’s like a documentary 😂

  • @zxc11118
    @zxc11118 Před rokem

    Excellent!

  • @ciaobello1261
    @ciaobello1261 Před rokem

    wild video😂 nice, thanks john for it

  • @felipeozoski
    @felipeozoski Před rokem

    Another awesome video thank you very much

  • @DEV8795
    @DEV8795 Před rokem

    bruh, love it. makes me wanna learn these stuff

  • @1_nS1d3
    @1_nS1d3 Před rokem

    Especially for ones interested in technologies like k8s in the security context, I can recommend the book from sparc flow "How to hack like a ghost"

  • @uayew892
    @uayew892 Před rokem +9

    Kubernetes will ignore the imagePullPolicy and will always try to pull the image if the image tag is :latest (or none, defaulting to :latest)

  • @gronono
    @gronono Před rokem

    Very nice video. Thanks a lot

  • @silentkille4
    @silentkille4 Před rokem

    this guy deserves a million subs + more

  • @user-mx6gi8fy6j
    @user-mx6gi8fy6j Před rokem +12

    thanks buddy this was basically a step by step guide for discovering major vulnerability in a popular service by pure accident. got me bug bounty money :D

  • @gashone

    awesome, more like this