Видео с ютуба Kubernetes Pentesting
Kubernetes Hacking: From Weak Applications to Cluster Control
3 tips for security testing of Kubernetes
Using Trivy and Falco to Detect Malware and exploitable binaries in a Kubernetes Environment
Pentest and Scan Kubernetes Clusters With Metasploit
Hacking a Kubernetes Cluster: A Practical Example!
Appsecco Kubernetes Hacking Masterclass
Pentesting with Kubernetes - Matt Hamilton - SW Unlocked
Hacking Web Apps, Kubernetes, and More! - (Pwned Labs)
Learn to Hack AWS & Kubernetes Clusters (for free)
Kubernetes Gotchas - Hacking and Defending Kubernetes
Kubernetes Penetration Testing –Part One
The Hacker's Guide to Kubernetes by Patrycja Wegrzynowicz
Kubernetes Pentesting: The Hacker’s Harvest
Hacking Kubernetes: CTF Edition | Rawkode Live
Keynote: Learn by Hacking: How to Run a 2,500 Node Kubernetes CTF - Andrew Martin & Andrés Vega
Tutorial: Hands-on Hacking Kubernetes and Ways to Prevent It - Eric Smalling, Snyk
The Devil in the Details: Kubernetes’ First Security Assessment - Aaron Small & Jay Beale
Pentesting Kubernetes: From Zero to Hero / Сергей Канибор / VolgaCTF 2022
Hacking into Kubernetes Security for Beginners - Ellen Körbes, Tilt & Tabitha Sable, Datadog
k22 - Hacking Kubernetes: Live Demo Marathon - Andrew Martin