Learn to Hack AWS & Kubernetes Clusters (for free)
jh.live/wiz || Get the big picture of your security posture across your entire cloud environment with Wiz and their Cloud Native Application Protection Platform: jh.live/wiz
Play EKS Cluster Games for free: jh.live/eks
Free Cybersecurity Education and Ethical Hacking
🔥KZread ALGORITHM ➡ Like, Comment, & Subscribe!
🙏SUPPORT THE CHANNEL ➡ jh.live/patreon
🤝 SPONSOR THE CHANNEL ➡ jh.live/sponsor
🌎FOLLOW ME EVERYWHERE ➡ jh.live/discord ↔ jh.live/twitter ↔ jh.live/linkedin ↔ jh.live/instagram ↔ jh.live/tiktok
💥 SEND ME MALWARE ➡ jh.live/malware
Пікірлер: 32
Can you read my mind?? I was just wanting to learn this. I was going to run GOAT but now I don't have to
I really missed you dealing with challenges live, and reminding us this is constantly a trial-error job
Love the video, I have worked with cloud for a few years now, but lately everything has jumped into evolution due to technical and business related requirements, so always noce to have games to play on and learn on real life applicable knowledge. Thanks so much for the content :)
WIZ is kicking ass! Seriously this company is doing ALL the right things and I can’t wait to test out their product for my next client.
You are absolutely a great teacher
The best way for interacting with kubernetes is to setup aliases in your bash profile, like k = kubectl so you can do things like k ctx to list your contexts or k get ns to list out the name spaces
@soumyaranjandas10
5 ай бұрын
I think when crearting contents it's better not to use alises because lots of beginner level will find it difficult.
@trustedsecurity6039
5 ай бұрын
😂 cool bro, it is for all commands... and if he does that people will be lost since WE have all out personnalisés aliases...
thank you for another awsome video!
nice content man
that awesome! love it
This is excellent! Kutos!
Totally so much fun. 😂
His my favourite tech KZreadr, so humble and funny at the time.😅😎 If he really did feel (dumb) for doing this, John probably wouldn't have made this video.😒 Stuff the haters bro.😁
@subhankarpaul9743
5 ай бұрын
Yes bro🤟
Whenever we get a awesome new unique project at work. I open KZread and John has a new video on the same exact topic. How???
Fun topic
can you teach us how to make an application embedded with payload and bypass google protection , thanks for your useful content ♥♥
Early crew.
any resources to pentest google cloud GKE
❤❤
❤️🖤
First hour 👆🏼
i mean at 3:50 you read the flag, why you blur it john 🙂
Imagine hiding the flags but Reading them EDIT : Thanks John for that like
@stuffnthings35
5 ай бұрын
Was literally thinking the same, lol. He's a quirky dude but hey! solid content, right?
@jordanarnould9056
5 ай бұрын
@@stuffnthings35 agreed. He makes my days everyday and I love it!
🎉🎉🎉🎉🎉
you should almost change your career into a commercial business.
1st
script kiddie stuff
@georgejones5019
5 ай бұрын
Stick to your OF.