References
This page contains references to interesting resources.
# CyberArk K8S pentest methodology
https://www.cyberark.com/resources/threat-research-blog/kubernetes-pentest-methodology-part-1
https://www.cyberark.com/resources/threat-research-blog/kubernetes-pentest-methodology-part-2
https://www.cyberark.com/resources/threat-research-blog/kubernetes-pentest-methodology-part-3
# Bad Pods privilege escalation
https://bishopfox.com/blog/kubernetes-pod-privilege-escalation
https://github.com/BishopFox/badPods
# Automatic tools
https://github.com/Shopify/kubeaudit
https://github.com/aquasecurity/kube-hunter
# HackTricks K8S
https://cloud.hacktricks.wiki/sr/pentesting-cloud/kubernetes-security/index.htmlLast updated