mirror of
https://github.com/HackTricks-wiki/hacktricks-cloud.git
synced 2026-01-21 00:43:15 -08:00
translate
This commit is contained in:
@@ -82,4 +82,3 @@ kubernetes-pivoting-to-clouds.md
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
@@ -700,4 +700,3 @@ https://github.com/aquasecurity/kube-bench
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
@@ -614,4 +614,3 @@ kubectl delete serviceaccount test-sa
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
@@ -51,4 +51,3 @@ spec:
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
@@ -397,4 +397,3 @@ Off-Menu +
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
@@ -217,4 +217,3 @@ kubectl get ingresses --all-namespaces -o=yaml
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
@@ -571,4 +571,3 @@ https://www.youtube.com/watch?v=X48VuDVv0do
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
@@ -614,4 +614,3 @@ https://www.cyberark.com/resources/threat-research-blog/kubernetes-pentest-metho
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
@@ -120,4 +120,3 @@ https://github.com/external-secrets/external-secrets
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
@@ -176,4 +176,3 @@ You should update your Kubernetes environment as frequently as necessary to have
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
@@ -64,4 +64,3 @@ Note that the attributes set in **both SecurityContext and PodSecurityContext**,
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
@@ -58,4 +58,3 @@ When a pod is created in the `default` namespace without the label `app: myapp`,
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
@@ -62,4 +62,3 @@ Another way to bypass policies is to focus on the ValidatingWebhookConfiguration
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
@@ -35,4 +35,3 @@ attacking-kubernetes-from-inside-a-pod.md
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
@@ -292,4 +292,3 @@ It will install agents in the selected pods and gather their traffic information
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
@@ -78,4 +78,3 @@ When Gatekeeper is deployed in the Kubernetes cluster, it will enforce this poli
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
@@ -65,4 +65,3 @@ Another way to bypass constraints is to focus on the ValidatingWebhookConfigurat
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
@@ -325,4 +325,3 @@ fi
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
@@ -167,4 +167,3 @@ abusing-roles-clusterroles-in-kubernetes/
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
@@ -104,4 +104,3 @@ abusing-roles-clusterroles-in-kubernetes/
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
@@ -216,4 +216,3 @@ https://labs.f-secure.com/blog/attacking-kubernetes-through-kubelet
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
@@ -111,4 +111,3 @@ Forbidden (user=system:node:ip-172-31-28-172.ec2.internal, verb=get, resource=no
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
Reference in New Issue
Block a user