all InfoSec news
K8s Runtime Attack Scenarios-2
June 27, 2023, 10:45 a.m. | Erdemstar
System Weakness - Medium systemweakness.com
In this article, I will show you to read the sensitive files in the container running in the K8s environment, both by using the application that has the vulnerability and by connecting pod with kubectl.
Introduction
Purpose of attack
In this attack scenario, I will use the Docker image of the .NET Core API application that I have developed before and which has many web vulnerabilities. By using the 2 different vulnerabilities on this application and connecting with pod with …
application security container security cybersecurity kubernetes security pentest
More from systemweakness.com / System Weakness - Medium
Limit Requests to EC2 Instances to Cloudflare Only IPs
2 days, 6 hours ago |
systemweakness.com
Canary Codes for Curious Minds
2 days, 6 hours ago |
systemweakness.com
Detecting Mobile Threats: Indicators of Compromise
3 days, 3 hours ago |
systemweakness.com
Jobs in InfoSec / Cybersecurity
SOC 2 Manager, Audit and Certification
@ Deloitte | US and CA Multiple Locations
Senior Security Researcher, SIEM
@ Huntress | Remote Canada
Senior Application Security Engineer
@ Revinate | San Francisco Bay Area
Cyber Security Manager
@ American Express Global Business Travel | United States - New York - Virtual Location
Incident Responder Intern
@ Bentley Systems | Remote, PA, US
SC2024-003533 Senior Online Vulnerability Assessment Analyst (CTS) - THU 9 May
@ EMW, Inc. | Mons, Wallonia, Belgium