Hacking Kubernetes via Vulnerable PHP | Kubernetes RCE
Автор: Hackinghijabi
Загружено: 2026-02-21
Просмотров: 46
Описание:
What happens when a vulnerable PHP is being utilized by a service hosted by a misconfigured Kubernetes cluster?
In this video, we demonstrate how a simple web vulnerability can lead to a full cluster compromise. We'll explore how attackers move from a basic RCE in a PHP container to harvesting ServiceAccount tokens and taking control of the K8s API.
What we cover:
🔍 Reconnaissance: Enumerating the web service and finding the PHP vulnerability.
🐚 Initial Access: Exploiting the PHP RCE to get inside the pod.
🛠️ K8s Enumeration: Checking ServiceAccount permissions and environment variables.
🚀 Privilege Escalation: Using the ServiceAccount token to interact with the K8s API and escalate privileges
Room link: https://tryhackme.com/room/frankandhe...
#Kubernetes #CyberSecurity #TryHackMe #DevSecOps #EthicalHacking #K8s #CKS #PHP
Повторяем попытку...
Доступные форматы для скачивания:
Скачать видео
-
Информация по загрузке: