Press enter or click to view image in full size
Introduction
This guide walks you through a complete black-box penetration test of a Kubernetes cluster. We start with zero knowledge and work step-by-step until we achieve full cluster compromise. Every command has been tested and verified.
If you like this research, buy me a coffee (PayPal) — Keep the lab running
Table of Contents
- Introduction
- Pre-Testing Setup
- Phase 0: Reconnaissance
- Phase 1: Initial Access
- Phase 2: Information Disclosure
- Phase 3: Privilege Escalation
- Phase 4: Cluster Access
- Phase 5: Lateral Movement
- Phase 6: Container Escape
- Phase 7: Full Cluster Compromise
- Complete Attack Chain Summary
What is Black-Box Testing?
Black-Box Testing means we have:
- No prior knowledge of the target