translate

This commit is contained in:
Carlos Polop
2025-01-01 21:36:15 +01:00
parent d0e6a85e6f
commit d0b9174054
243 changed files with 21 additions and 264 deletions

View File

@@ -82,4 +82,3 @@ kubernetes-pivoting-to-clouds.md

View File

@@ -700,4 +700,3 @@ https://github.com/aquasecurity/kube-bench

View File

@@ -217,4 +217,3 @@ kubectl get ingresses --all-namespaces -o=yaml

View File

@@ -571,4 +571,3 @@ https://www.youtube.com/watch?v=X48VuDVv0do

View File

@@ -614,4 +614,3 @@ https://www.cyberark.com/resources/threat-research-blog/kubernetes-pentest-metho

View File

@@ -120,4 +120,3 @@ https://github.com/external-secrets/external-secrets

View File

@@ -176,4 +176,3 @@ You should update your Kubernetes environment as frequently as necessary to have

View File

@@ -64,4 +64,3 @@ Note that the attributes set in **both SecurityContext and PodSecurityContext**,

View File

@@ -58,4 +58,3 @@ When a pod is created in the `default` namespace without the label `app: myapp`,

View File

@@ -62,4 +62,3 @@ Another way to bypass policies is to focus on the ValidatingWebhookConfiguration

View File

@@ -35,4 +35,3 @@ attacking-kubernetes-from-inside-a-pod.md

View File

@@ -292,4 +292,3 @@ It will install agents in the selected pods and gather their traffic information

View File

@@ -78,4 +78,3 @@ When Gatekeeper is deployed in the Kubernetes cluster, it will enforce this poli

View File

@@ -65,4 +65,3 @@ Another way to bypass constraints is to focus on the ValidatingWebhookConfigurat

View File

@@ -167,4 +167,3 @@ abusing-roles-clusterroles-in-kubernetes/

View File

@@ -104,4 +104,3 @@ abusing-roles-clusterroles-in-kubernetes/

View File

@@ -216,4 +216,3 @@ https://labs.f-secure.com/blog/attacking-kubernetes-through-kubelet

View File

@@ -111,4 +111,3 @@ Forbidden (user=system:node:ip-172-31-28-172.ec2.internal, verb=get, resource=no