Cloud Security Podcast cover image

AWS Cloud Penetration Testing Explained with Example

Cloud Security Podcast

00:00

Kubernetes Pentesting

Everything I said tonight applies to Kubernetes. So if you have the ability to create pods and you talked about this with your, you're asking about like Docker privilege escalation. You might be able to use bad pods to basically get full access to the cluster. And so that attack only applies to if you're simulating somebody who has access to create pods in a cluster.

Transcript
Play full episode

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app