Видео с ютуба Kubernetes Pentesting
Kubernetes Hacking: From Weak Applications to Cluster Control
3 tips for security testing of Kubernetes
Using Trivy and Falco to Detect Malware and exploitable binaries in a Kubernetes Environment
Pentest and Scan Kubernetes Clusters With Metasploit
Hacking a Kubernetes Cluster: A Practical Example!
Pentesting with Kubernetes - Matt Hamilton - SW Unlocked
Hacking Web Apps, Kubernetes, and More! - (Pwned Labs)
Appsecco Kubernetes Hacking Masterclass
Learn to Hack AWS & Kubernetes Clusters (for free)
Kubernetes Gotchas - Hacking and Defending Kubernetes
Kubernetes Penetration Testing –Part One
The Hacker's Guide to Kubernetes by Patrycja Wegrzynowicz
Hacking Kubernetes: CTF Edition | Rawkode Live
Kubernetes Pentesting: The Hacker’s Harvest
Keynote: Learn by Hacking: How to Run a 2,500 Node Kubernetes CTF - Andrew Martin & Andrés Vega
The Devil in the Details: Kubernetes’ First Security Assessment - Aaron Small & Jay Beale
one request = full remote code execution (IngressNightmare Kubernetes hack explained)
Tutorial: Hands-on Hacking Kubernetes and Ways to Prevent It - Eric Smalling, Snyk