Exec/Attach Credential Theft
Attack scenario demonstrating how kubectl exec and attach commands can be abused to steal credentials and sensitive data from running containers.
Attack scenario demonstrating how kubectl exec and attach commands can be abused to steal credentials and sensitive data from running containers.
Attack scenario demonstrating how attackers extract image pull secrets to gain unauthorized access to private container registries.
Understanding the risks of insecure secrets management in Kubernetes and how it can lead to sensitive data exposure.
Best practices to prevent the exposure of sensitive data in Kubernetes through secure secrets management techniques and external secret stores.
How attackers exploit unrestricted access to etcd to retrieve Kubernetes secrets and take control of the cluster.