25.8.20
This website uses cookies to ensure you get the best experience on our website. Learn more

A Practical Approach to Breaking & Pwning Kubernetes Clusters

The adoption of Kubernetes use in production has increased to 83% from a survey by CNCF. Still, most security teams struggle to understand these modern technologies. In this real-world scenario-based training, each participant will be learning Tactics, Techniques, and Procedures (TTPs) to attack and assess Kubernetes cluster environments at different layers like Supply chain, Infrastructure, Runtime, and many others. Some of the things you will be doing in this course: Exploiting Misconfigurations, Private Registries by performing simple Recon Escaping out of containers to host systems and clusters to gain more access Escalating privileges, DoS cluster resources, Lateral movement from container Gaining unauthorized access to namespaces, microservices, data, and logs Breaking the boundaries of NSP(Network Security Policy), RBAC, Profiles Defense evasion techniques & Persistence in Cluster Environments Bypassing the solutions like Policy Engines, Resource limits, and Controls Evaluating the cluster security using CIS benchmarks and Cluster Audits to find all possible risks Also, the trainer will provide step by step guide(Digital Book) with resources and references to further your learning.

Skills / Knowledge

  • PenTesting
  • Risk

Issued on

December 5, 2023

Expires on

Does not expire