No video

Kubernetes Hacking: From Weak Applications to Cluster Control

  Рет қаралды 62,388

John Hammond

John Hammond

Күн бұрын

j-h.io/sysdig || Use Sysdig to keep your runtime environments secure, across Kubernetes clusters, the CI/CD pipeline, and your production environment! j-h.io/sysdig
🔥 KZbin ALGORITHM ➡ Like, Comment, & Subscribe!
🙏 SUPPORT THE CHANNEL ➡ jh.live/patreon
🤝 SPONSOR THE CHANNEL ➡ jh.live/sponsor
🌎 FOLLOW ME EVERYWHERE ➡ jh.live/discord ↔ jh.live/twitter ↔ jh.live/linkedin ↔ jh.live/instagram ↔ jh.live/tiktok
💥 SEND ME MALWARE ➡ jh.live/malware

Пікірлер: 69
@einpseudonym7604
@einpseudonym7604 Жыл бұрын
Great topic, especially in this time and age very cool to see container vulnerabilities in action
@Quephara
@Quephara Жыл бұрын
I need to buy glasses, that's probably this guy's superpower
@reinmarvonzweter666
@reinmarvonzweter666 Жыл бұрын
Maybe try growing a beard?
@the_sandman00
@the_sandman00 Жыл бұрын
Tried it. It’s not
@vq8gef32
@vq8gef32 Жыл бұрын
LooL
@petevenuti7355
@petevenuti7355 Жыл бұрын
​@@the_sandman00 it was for me, back when I was 14..
@Damian04233
@Damian04233 Жыл бұрын
Dude.. I promise you that though they are not the source of his superpower -😐 they are without a doubt, im telling you beyond likely, we're talking menswearhouse, multiplying his powers anywhere between a standard 50%, like you get from sunglasses to upwards of 2500% depending on who made the frames, if they're Luxottica, pssh¡, fuhgett abod it. I used to be an Optician, I know.
@janwrona9539
@janwrona9539 Жыл бұрын
Trick with --path-as-is is super cool ! Currently working with containers and kubernates from a dev perspective but this video brings new point of view for me ! Thanks :)
@ttrss
@ttrss Жыл бұрын
that would have got me stuck for so longg
@kebien6020
@kebien6020 Жыл бұрын
Some pro-tips for the messed up terminal. Try the command stty sane to see if that fixes your shell. At the very least you can override your PS1 with something very short to avoid being so close to the end of the screen. Something like: export PS1='\w\$ ' This might even fix the text wrapping in the wrong place, which is caused by bash not knowing accurately how long the prompt text is, because of the control characters that make the prompt have colors.
@user-mx6gi8fy6j
@user-mx6gi8fy6j Жыл бұрын
thanks buddy this was basically a step by step guide for discovering major vulnerability in a popular service by pure accident. got me bug bounty money :D
@uayew892
@uayew892 Жыл бұрын
Kubernetes will ignore the imagePullPolicy and will always try to pull the image if the image tag is :latest (or none, defaulting to :latest)
@justchecking2470
@justchecking2470 Жыл бұрын
I like his style when he starts intro speaking it’s like a documentary 😂
@1_nS1d3
@1_nS1d3 Жыл бұрын
Especially for ones interested in technologies like k8s in the security context, I can recommend the book from sparc flow "How to hack like a ghost"
@exoric7408
@exoric7408 Жыл бұрын
Great video John ! As always !
@manonmission2010
@manonmission2010 4 ай бұрын
love your high quality videos
@vivekmishra69
@vivekmishra69 Жыл бұрын
Very nice tutorial thanks for sharing. You could have also edited the grafana pod using "kubectl edit grafana pod" and make it previleged pod and mount host directory instead of creating new pod..
@pranavpatil7748
@pranavpatil7748 Жыл бұрын
Great video John? Can you let us know which machine/image/box you are using
@grover-
@grover- Жыл бұрын
Did anyone get the link to this if it's in hack the box?
@hack_well
@hack_well Жыл бұрын
Thank you for your walkthrough, May God bless you 🎭
@marco201ful
@marco201ful Жыл бұрын
You should talk about Security Blue Team, I know you helped them build their videos.
@scorpion_lux
@scorpion_lux Жыл бұрын
What a fantastic video congratulations as always
@gashone
@gashone 7 ай бұрын
awesome, more like this
@silentkille4
@silentkille4 Жыл бұрын
this guy deserves a million subs + more
@klanker
@klanker Жыл бұрын
more kubernetes pls
@DEV8795
@DEV8795 Жыл бұрын
bruh, love it. makes me wanna learn these stuff
@ciaobello1261
@ciaobello1261 Жыл бұрын
wild video😂 nice, thanks john for it
@GroupFacade9264
@GroupFacade9264 Жыл бұрын
I was just thinking gabout this, reading my mind.
@raav33n
@raav33n Жыл бұрын
This was super cool. What CTF is this from?
@iCortex1
@iCortex1 Жыл бұрын
Any plans to cover the google chrome 0 day that happened a few days ago ?
@felipeozoski
@felipeozoski Жыл бұрын
Another awesome video thank you very much
@gronono
@gronono Жыл бұрын
Very nice video. Thanks a lot
@wolfrevokcats7890
@wolfrevokcats7890 Жыл бұрын
3:12 pwncat-cs is superb replacement for netcat
@zxc11118
@zxc11118 Жыл бұрын
Excellent!
@tn5848
@tn5848 4 күн бұрын
Is this a CTF machine or anything else?
@networkmastro1402
@networkmastro1402 Жыл бұрын
thanks this is good staff
@medamineoueslati9719
@medamineoueslati9719 2 ай бұрын
When can i find the application i want to deploy it and practice
@cheick127
@cheick127 Жыл бұрын
A really good content
@liudvikasstankus
@liudvikasstankus Жыл бұрын
this is awesome
@localhost69
@localhost69 Жыл бұрын
nice
@ReligionAndMaterialismDebunked
@ReligionAndMaterialismDebunked Жыл бұрын
Early in the comments. Nice! 2 hours ago!
@guyhavia1730
@guyhavia1730 7 ай бұрын
What is the ctf url?
@craigblackie2034
@craigblackie2034 Жыл бұрын
There's a distinction between LFI and directory traversal - I don't believe what you had was LFI.
@craigblackie2034
@craigblackie2034 Жыл бұрын
But great videos though!
@topegpt
@topegpt Жыл бұрын
Could nod locate Gemfilr termux metasploit, help
@bhagyalakshmi1053
@bhagyalakshmi1053 Жыл бұрын
My my language mistake but understanding never to attending after understanding again to looking you have the never misunderstanding but health problems are also more patients also I will attend
@ReligionAndMaterialismDebunked
@ReligionAndMaterialismDebunked Жыл бұрын
Yeah, I've heard of this system before by a Norwegian, or whatever ethical hacker dude. :3
@vq8gef32
@vq8gef32 Жыл бұрын
Hi , Is this machine on HTB? Or any where that I can try it?
@vq8gef32
@vq8gef32 Жыл бұрын
I used pwncat-cs for my HTB - better experience )
@MP-wm9gb
@MP-wm9gb Жыл бұрын
Is Docker now really secured OR there is still a breach which allows container breakout/escape?
@somerandomwithacat750
@somerandomwithacat750 Жыл бұрын
Is this a VM I can play?
@triggerHLM
@triggerHLM Жыл бұрын
Isn't this example very constructed? In case somone exposes a shell direclty over a webinterface the game is over anyway.
@marccheat121
@marccheat121 Жыл бұрын
Can you share link vm or image to create this k8s lab ?
@JontheRippa
@JontheRippa Жыл бұрын
👍👍👍👍
@djmasnas
@djmasnas Жыл бұрын
There is no secure place in the world ! Relax and take it easy
@gawaderanjeetsandipdypit3167
@gawaderanjeetsandipdypit3167 Жыл бұрын
This guy beats Dev-ops Engineer
@user-tf9ie2re9x
@user-tf9ie2re9x Жыл бұрын
Many KZbin videos I have seen. That didn't work at all... Professional, 100% working software suggestion for audio recovery from android internal storage is required, please.
@creatorofimages7925
@creatorofimages7925 Жыл бұрын
Copy Cat
@Hackwraghav
@Hackwraghav 11 ай бұрын
Ed Sheeran
@johnreinermarcos
@johnreinermarcos Жыл бұрын
Makdkd
@stefanosbek
@stefanosbek Жыл бұрын
Highly suggest "SteamCloud" on hack the box to those wanting to get their hands on a CTF such as the one in the video
@issamafifi5545
@issamafifi5545 Жыл бұрын
I have worked for Global Cyber Security Company for more than 8 months, what I learned form your video more than what I learned form all of them 😆😆😆 thank you John >> you_are_the_best.txt
@elchinefa9524
@elchinefa9524 Жыл бұрын
As a K8S Admin very happy to see this one. I would like to try it aswell. Which CTF was it? TryhackMe?
Hacking CI/CD (Basic Pipeline Poisoning)
22:41
John Hammond
Рет қаралды 55 М.
Finding WEIRD Devices on the Public Internet
27:48
John Hammond
Рет қаралды 256 М.
7 Days Stranded In A Cave
17:59
MrBeast
Рет қаралды 97 МЛН
나랑 아빠가 아이스크림 먹을 때
00:15
진영민yeongmin
Рет қаралды 6 МЛН
Can This Bubble Save My Life? 😱
00:55
Topper Guild
Рет қаралды 87 МЛН
you need to learn Kubernetes RIGHT NOW!!
29:34
NetworkChuck
Рет қаралды 1,2 МЛН
SQLite Blind SQL Injection - HackTheBox Cyber Apocalypse CTF
35:25
John Hammond
Рет қаралды 71 М.
HAVOC C2 - Demon Bypasses Windows 11 Defender
34:22
Rojahs Montari
Рет қаралды 3,2 М.
How Hackers Move Through Networks (with Ligolo)
20:01
John Hammond
Рет қаралды 267 М.
Do NOT Learn Kubernetes Without Knowing These Concepts...
13:01
Travis Media
Рет қаралды 275 М.
How To Pivot Through a Network with Chisel
33:45
John Hammond
Рет қаралды 124 М.
How to Hack ArgoCD to Cluster Administrator
19:24
John Hammond
Рет қаралды 11 М.
How To Bypass Website File Upload Restrictions
20:18
John Hammond
Рет қаралды 134 М.
Gitlab LFI to RCE - HackTheBox "Laboratory"
1:13:44
John Hammond
Рет қаралды 116 М.
7 Days Stranded In A Cave
17:59
MrBeast
Рет қаралды 97 МЛН