Difference between revisions of "Pentest Kubernetes"
Jump to navigation
Jump to search
(3 intermediate revisions by the same user not shown) | |||
Line 7: | Line 7: | ||
https://www.tenable.com/blog/auditing-kubernetes-for-secure-configurations | https://www.tenable.com/blog/auditing-kubernetes-for-secure-configurations | ||
+ | |||
+ | - https://techgenix.com/kubernetes-security-tools/ | ||
+ | - https://github.com/aquasecurity/kube-bench | ||
+ | |||
+ | |||
+ | https://kubernetes.io/docs/tasks/configure-pod-container/share-process-namespace/ | ||
+ | |||
+ | https://github.com/heptiolabs/pid2pod |
Latest revision as of 03:43, 18 June 2021
https://www.cyberark.com/resources/threat-research-blog/kubernetes-pentest-methodology-part-1
https://github.com/aquasecurity/kube-hunter
https://github.com/inguardians/peirates
https://www.tenable.com/blog/auditing-kubernetes-for-secure-configurations
https://kubernetes.io/docs/tasks/configure-pod-container/share-process-namespace/