June 27, 2023, 10:45 a.m. | Erdemstar

System Weakness - Medium systemweakness.com

In this article, I will show you to read the sensitive files in the container running in the K8s environment, both by using the application that has the vulnerability and by connecting pod with kubectl.

Introduction

Purpose of attack

In this attack scenario, I will use the Docker image of the .NET Core API application that I have developed before and which has many web vulnerabilities. By using the 2 different vulnerabilities on this application and connecting with pod with …

application security container security cybersecurity kubernetes security pentest

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Senior Security Researcher, SIEM

@ Huntress | Remote Canada

Senior Application Security Engineer

@ Revinate | San Francisco Bay Area

Cyber Security Manager

@ American Express Global Business Travel | United States - New York - Virtual Location

Incident Responder Intern

@ Bentley Systems | Remote, PA, US

SC2024-003533 Senior Online Vulnerability Assessment Analyst (CTS) - THU 9 May

@ EMW, Inc. | Mons, Wallonia, Belgium