Kubernetes Hacking: From Weak Applications to Cluster Control

j-h.io/sysdig || Use Sysdig to keep your runtime environments secure, across Kubernetes clusters, the CI/CD pipeline, and your production environment! j-h.io/sysdig
🔥 KZread ALGORITHM ➡ Like, Comment, & Subscribe!
🙏 SUPPORT THE CHANNEL ➡ jh.live/patreon
🤝 SPONSOR THE CHANNEL ➡ jh.live/sponsor
🌎 FOLLOW ME EVERYWHERE ➡ jh.live/discord ↔ jh.live/twitter ↔ jh.live/linkedin ↔ jh.live/instagram ↔ jh.live/tiktok
💥 SEND ME MALWARE ➡ jh.live/malware

Пікірлер: 67

  • @einpseudonym7604
    @einpseudonym7604 Жыл бұрын

    Great topic, especially in this time and age very cool to see container vulnerabilities in action

  • @Quephara
    @Quephara Жыл бұрын

    I need to buy glasses, that's probably this guy's superpower

  • @reinmarvonzweter666

    @reinmarvonzweter666

    Жыл бұрын

    Maybe try growing a beard?

  • @the_sandman00

    @the_sandman00

    Жыл бұрын

    Tried it. It’s not

  • @vq8gef32

    @vq8gef32

    Жыл бұрын

    LooL

  • @petevenuti7355

    @petevenuti7355

    Жыл бұрын

    ​@@the_sandman00 it was for me, back when I was 14..

  • @Damian04233

    @Damian04233

    Жыл бұрын

    Dude.. I promise you that though they are not the source of his superpower -😐 they are without a doubt, im telling you beyond likely, we're talking menswearhouse, multiplying his powers anywhere between a standard 50%, like you get from sunglasses to upwards of 2500% depending on who made the frames, if they're Luxottica, pssh¡, fuhgett abod it. I used to be an Optician, I know.

  • @janwrona9539
    @janwrona9539 Жыл бұрын

    Trick with --path-as-is is super cool ! Currently working with containers and kubernates from a dev perspective but this video brings new point of view for me ! Thanks :)

  • @ttrss

    @ttrss

    Жыл бұрын

    that would have got me stuck for so longg

  • @kebien6020
    @kebien6020 Жыл бұрын

    Some pro-tips for the messed up terminal. Try the command stty sane to see if that fixes your shell. At the very least you can override your PS1 with something very short to avoid being so close to the end of the screen. Something like: export PS1='\w\$ ' This might even fix the text wrapping in the wrong place, which is caused by bash not knowing accurately how long the prompt text is, because of the control characters that make the prompt have colors.

  • @uayew892
    @uayew892 Жыл бұрын

    Kubernetes will ignore the imagePullPolicy and will always try to pull the image if the image tag is :latest (or none, defaulting to :latest)

  • @exoric7408
    @exoric7408 Жыл бұрын

    Great video John ! As always !

  • @hack_well
    @hack_well Жыл бұрын

    Thank you for your walkthrough, May God bless you 🎭

  • @vivekmishra69
    @vivekmishra69 Жыл бұрын

    Very nice tutorial thanks for sharing. You could have also edited the grafana pod using "kubectl edit grafana pod" and make it previleged pod and mount host directory instead of creating new pod..

  • @1_nS1d3
    @1_nS1d3 Жыл бұрын

    Especially for ones interested in technologies like k8s in the security context, I can recommend the book from sparc flow "How to hack like a ghost"

  • @scorpion_lux
    @scorpion_lux Жыл бұрын

    What a fantastic video congratulations as always

  • @ciaobello1261
    @ciaobello1261 Жыл бұрын

    wild video😂 nice, thanks john for it

  • @justchecking2470
    @justchecking2470 Жыл бұрын

    I like his style when he starts intro speaking it’s like a documentary 😂

  • @aimoncabral2887
    @aimoncabral2887 Жыл бұрын

    Excellent!

  • @felipeozoski
    @felipeozoski Жыл бұрын

    Another awesome video thank you very much

  • @DEV8795
    @DEV8795 Жыл бұрын

    bruh, love it. makes me wanna learn these stuff

  • @gronono
    @gronono Жыл бұрын

    Very nice video. Thanks a lot

  • @manonmission2010
    @manonmission2010Ай бұрын

    love your high quality videos

  • @user-mx6gi8fy6j
    @user-mx6gi8fy6j Жыл бұрын

    thanks buddy this was basically a step by step guide for discovering major vulnerability in a popular service by pure accident. got me bug bounty money :D

  • @marco201ful
    @marco201ful Жыл бұрын

    You should talk about Security Blue Team, I know you helped them build their videos.

  • @pranavpatil7748
    @pranavpatil7748 Жыл бұрын

    Great video John? Can you let us know which machine/image/box you are using

  • @grover-

    @grover-

    Жыл бұрын

    Did anyone get the link to this if it's in hack the box?

  • @raav33n
    @raav33n Жыл бұрын

    This was super cool. What CTF is this from?

  • @silentkille4
    @silentkille4 Жыл бұрын

    this guy deserves a million subs + more

  • @networkmastro1402
    @networkmastro1402 Жыл бұрын

    thanks this is good staff

  • @cheick127
    @cheick127 Жыл бұрын

    A really good content

  • @GroupFacade9264
    @GroupFacade9264 Жыл бұрын

    I was just thinking gabout this, reading my mind.

  • @wolfrevokcats7890
    @wolfrevokcats7890 Жыл бұрын

    3:12 pwncat-cs is superb replacement for netcat

  • @liudvikasstankus
    @liudvikasstankus Жыл бұрын

    this is awesome

  • @klanker
    @klanker Жыл бұрын

    more kubernetes pls

  • @gashone
    @gashone3 ай бұрын

    awesome, more like this

  • @iCortex1
    @iCortex1 Жыл бұрын

    Any plans to cover the google chrome 0 day that happened a few days ago ?

  • @topegpt
    @topegpt Жыл бұрын

    Could nod locate Gemfilr termux metasploit, help

  • @craigblackie2034
    @craigblackie2034 Жыл бұрын

    There's a distinction between LFI and directory traversal - I don't believe what you had was LFI.

  • @craigblackie2034

    @craigblackie2034

    Жыл бұрын

    But great videos though!

  • @localhost69
    @localhost6910 ай бұрын

    nice

  • @ReligionAndMaterialismDebunked
    @ReligionAndMaterialismDebunked Жыл бұрын

    Yeah, I've heard of this system before by a Norwegian, or whatever ethical hacker dude. :3

  • @ReligionAndMaterialismDebunked
    @ReligionAndMaterialismDebunked Жыл бұрын

    Early in the comments. Nice! 2 hours ago!

  • @bhagyalakshmi1053
    @bhagyalakshmi1053 Жыл бұрын

    My my language mistake but understanding never to attending after understanding again to looking you have the never misunderstanding but health problems are also more patients also I will attend

  • @JontheRippa
    @JontheRippa Жыл бұрын

    👍👍👍👍

  • @marccheat121
    @marccheat121 Жыл бұрын

    Can you share link vm or image to create this k8s lab ?

  • @guyhavia1730
    @guyhavia17304 ай бұрын

    What is the ctf url?

  • @vq8gef32
    @vq8gef32 Жыл бұрын

    Hi , Is this machine on HTB? Or any where that I can try it?

  • @vq8gef32

    @vq8gef32

    Жыл бұрын

    I used pwncat-cs for my HTB - better experience )

  • @somerandomwithacat750
    @somerandomwithacat750 Жыл бұрын

    Is this a VM I can play?

  • @MP-wm9gb
    @MP-wm9gb Жыл бұрын

    Is Docker now really secured OR there is still a breach which allows container breakout/escape?

  • @triggerHLM
    @triggerHLM Жыл бұрын

    Isn't this example very constructed? In case somone exposes a shell direclty over a webinterface the game is over anyway.

  • @djmasnas
    @djmasnas Жыл бұрын

    There is no secure place in the world ! Relax and take it easy

  • @gawaderanjeetsandipdypit3167
    @gawaderanjeetsandipdypit3167 Жыл бұрын

    This guy beats Dev-ops Engineer

  • @user-tf9ie2re9x
    @user-tf9ie2re9x Жыл бұрын

    Many KZread videos I have seen. That didn't work at all... Professional, 100% working software suggestion for audio recovery from android internal storage is required, please.

  • @creatorofimages7925

    @creatorofimages7925

    Жыл бұрын

    Copy Cat

  • @Hackwraghav
    @Hackwraghav7 ай бұрын

    Ed Sheeran

  • @johnreinermarcos4491
    @johnreinermarcos4491 Жыл бұрын

    Makdkd

  • @stefanosbek
    @stefanosbek Жыл бұрын

    Highly suggest "SteamCloud" on hack the box to those wanting to get their hands on a CTF such as the one in the video

  • @issamafifi5545
    @issamafifi5545 Жыл бұрын

    I have worked for Global Cyber Security Company for more than 8 months, what I learned form your video more than what I learned form all of them 😆😆😆 thank you John >> you_are_the_best.txt

  • @elchinefa9524
    @elchinefa9524 Жыл бұрын

    As a K8S Admin very happy to see this one. I would like to try it aswell. Which CTF was it? TryhackMe?