Using Kubelet Client to Attack the Kubernetes Cluster
In this blog post, we are going to look at the Kubernetes agent, kubelet (see Figure 1), which is responsible for the creation of the containers inside the nodes and show how it can be ... Read More
Eight Ways to Create a Pod
Overview In our previous research post, “Securing Kubernetes Clusters by Eliminating Risky Permissions”, we covered five examples of risky permissions that can be manipulated by an attacker. One of them was the creation of Pods ... Read More
Securing Kubernetes Clusters by Eliminating Risky Permissions
Before the advent of containers, many of us probably remember sending applications to friends or coworkers to test, only to hear them say that the exact same code you already successfully tested doesn’t work for ... Read More

