Skip to main content

24 docs tagged with "attack-vector"

View all tags

Cloud Metadata Service Abuse

How attackers exploit cloud provider metadata services (IMDS) from Kubernetes pods to steal IAM credentials and escalate privileges.

Compromised API Server

Exploiting Kubernetes API server vulnerabilities and how attackers gain unauthorized access.

Compromised Sidecars

How attackers exploit insecure or malicious sidecar containers to intercept data, escalate privileges, and persist within Kubernetes clusters.

Container Escape

How an attacker can break out of a container and gain control over the host system in Kubernetes.

Ephemeral Debug Container Abuse

How attackers abuse kubectl debug and ephemeral containers to inject debugging tools, access process namespaces, and compromise Kubernetes workloads.

Exec/Attach Credential Theft

Attack scenario demonstrating how kubectl exec and attach commands can be abused to steal credentials and sensitive data from running containers.

Exposed Kubelet API

How an exposed Kubelet API can be exploited to execute commands on nodes and compromise Kubernetes clusters.

ImagePullSecrets Theft

Attack scenario demonstrating how attackers extract image pull secrets to gain unauthorized access to private container registries.

Insecure CSI Drivers

How attackers exploit insecure Container Storage Interface (CSI) drivers to gain unauthorized access to persistent volumes and sensitive data.

Insecure RBAC Permissions

How overly permissive Kubernetes RBAC configurations enable privilege escalation and full cluster compromise.

Insecure Secrets Management

Understanding the risks of insecure secrets management in Kubernetes and how it can lead to sensitive data exposure.

Kubernetes Attack Vectors

Comprehensive guide to Kubernetes attack vectors including container escapes, privilege escalation, RBAC exploitation, and cluster compromise techniques.

Lack of Network Policies

How missing Kubernetes Network Policies enable lateral movement and data exfiltration by attackers.

Persistent Volume Data Exposure

How attackers exploit misconfigured PersistentVolumes to access sensitive data from other workloads or previously deleted pods in Kubernetes.

Privileged Service Accounts

How attackers exploit overly privileged Kubernetes Service Accounts to gain cluster-wide access and escalate privileges.

Supply Chain Attacks

How attackers compromise container images, dependencies, CI/CD pipelines, and Helm charts to infiltrate Kubernetes clusters.

Traffic Hijacking

How attackers manipulate Kubernetes network traffic to intercept, redirect, or disrupt communication between workloads.

Unrestricted etcd Access

How attackers exploit unrestricted access to etcd to retrieve Kubernetes secrets and take control of the cluster.

Unrestricted HostPath Mounts

How attackers exploit unrestricted hostPath mounts to gain access to the host filesystem and escalate privileges.