References

This page contains references to interesting resources.

# CyberArk K8S pentest methodology
https://www.cyberark.com/resources/threat-research-blog/kubernetes-pentest-methodology-part-1
https://www.cyberark.com/resources/threat-research-blog/kubernetes-pentest-methodology-part-2
https://www.cyberark.com/resources/threat-research-blog/kubernetes-pentest-methodology-part-3

# Bad Pods privilege escalation
https://bishopfox.com/blog/kubernetes-pod-privilege-escalation
https://github.com/BishopFox/badPods

# Automatic tools
https://github.com/Shopify/kubeaudit
https://github.com/aquasecurity/kube-hunter

# HackTricks K8S
https://cloud.hacktricks.wiki/sr/pentesting-cloud/kubernetes-security/index.html

Last updated