Cloud Metadata Service Abuse
How attackers exploit cloud provider metadata services (IMDS) from Kubernetes pods to steal IAM credentials and escalate privileges.
How attackers exploit cloud provider metadata services (IMDS) from Kubernetes pods to steal IAM credentials and escalate privileges.
How attackers exploit Kubernetes default group merging behavior to inject unauthorized supplemental group IDs from container images into running pod processes.
How to use supplementalGroupsPolicy: Strict to prevent container images from injecting unauthorized supplemental group IDs into Kubernetes pod processes.
How to configure Linux capabilities in Kubernetes pod security contexts to prevent privilege escalation and reduce the container attack surface.
How overly permissive Kubernetes RBAC configurations enable privilege escalation and full cluster compromise.
How attackers exploit overly privileged Kubernetes Service Accounts to gain cluster-wide access and escalate privileges.
How to use Linux user namespaces in Kubernetes pods to isolate container UIDs from the host and reduce the blast radius of container escapes.