Kubernetes Hacking: From Weak Applications to Cluster Control

  Рет қаралды 60,224

John Hammond

John Hammond

Жыл бұрын

j-h.io/sysdig || Use Sysdig to keep your runtime environments secure, across Kubernetes clusters, the CI/CD pipeline, and your production environment! j-h.io/sysdig
🔥 KZbin ALGORITHM ➡ Like, Comment, & Subscribe!
🙏 SUPPORT THE CHANNEL ➡ jh.live/patreon
🤝 SPONSOR THE CHANNEL ➡ jh.live/sponsor
🌎 FOLLOW ME EVERYWHERE ➡ jh.live/discord ↔ jh.live/twitter ↔ jh.live/linkedin ↔ jh.live/instagram ↔ jh.live/tiktok
💥 SEND ME MALWARE ➡ jh.live/malware

Пікірлер: 68
@Quephara
@Quephara Жыл бұрын
I need to buy glasses, that's probably this guy's superpower
@reinmarvonzweter666
@reinmarvonzweter666 Жыл бұрын
Maybe try growing a beard?
@the_sandman00
@the_sandman00 Жыл бұрын
Tried it. It’s not
@vq8gef32
@vq8gef32 Жыл бұрын
LooL
@petevenuti7355
@petevenuti7355 Жыл бұрын
​@@the_sandman00 it was for me, back when I was 14..
@Damian04233
@Damian04233 Жыл бұрын
Dude.. I promise you that though they are not the source of his superpower -😐 they are without a doubt, im telling you beyond likely, we're talking menswearhouse, multiplying his powers anywhere between a standard 50%, like you get from sunglasses to upwards of 2500% depending on who made the frames, if they're Luxottica, pssh¡, fuhgett abod it. I used to be an Optician, I know.
@einpseudonym7604
@einpseudonym7604 Жыл бұрын
Great topic, especially in this time and age very cool to see container vulnerabilities in action
@janwrona9539
@janwrona9539 Жыл бұрын
Trick with --path-as-is is super cool ! Currently working with containers and kubernates from a dev perspective but this video brings new point of view for me ! Thanks :)
@ttrss
@ttrss Жыл бұрын
that would have got me stuck for so longg
@exoric7408
@exoric7408 Жыл бұрын
Great video John ! As always !
@kebien6020
@kebien6020 Жыл бұрын
Some pro-tips for the messed up terminal. Try the command stty sane to see if that fixes your shell. At the very least you can override your PS1 with something very short to avoid being so close to the end of the screen. Something like: export PS1='\w\$ ' This might even fix the text wrapping in the wrong place, which is caused by bash not knowing accurately how long the prompt text is, because of the control characters that make the prompt have colors.
@scorpion_lux
@scorpion_lux Жыл бұрын
What a fantastic video congratulations as always
@hack_well
@hack_well Жыл бұрын
Thank you for your walkthrough, May God bless you 🎭
@manonmission2010
@manonmission2010 2 ай бұрын
love your high quality videos
@vivekmishra69
@vivekmishra69 Жыл бұрын
Very nice tutorial thanks for sharing. You could have also edited the grafana pod using "kubectl edit grafana pod" and make it previleged pod and mount host directory instead of creating new pod..
@1_nS1d3
@1_nS1d3 Жыл бұрын
Especially for ones interested in technologies like k8s in the security context, I can recommend the book from sparc flow "How to hack like a ghost"
@justchecking2470
@justchecking2470 Жыл бұрын
I like his style when he starts intro speaking it’s like a documentary 😂
@ciaobello1261
@ciaobello1261 Жыл бұрын
wild video😂 nice, thanks john for it
@DEV8795
@DEV8795 Жыл бұрын
bruh, love it. makes me wanna learn these stuff
@felipeozoski
@felipeozoski Жыл бұрын
Another awesome video thank you very much
@gronono
@gronono Жыл бұрын
Very nice video. Thanks a lot
@zxc11118
@zxc11118 Жыл бұрын
Excellent!
@uayew892
@uayew892 Жыл бұрын
Kubernetes will ignore the imagePullPolicy and will always try to pull the image if the image tag is :latest (or none, defaulting to :latest)
@silentkille4
@silentkille4 Жыл бұрын
this guy deserves a million subs + more
@marco201ful
@marco201ful Жыл бұрын
You should talk about Security Blue Team, I know you helped them build their videos.
@raav33n
@raav33n Жыл бұрын
This was super cool. What CTF is this from?
@user-mx6gi8fy6j
@user-mx6gi8fy6j Жыл бұрын
thanks buddy this was basically a step by step guide for discovering major vulnerability in a popular service by pure accident. got me bug bounty money :D
@gashone
@gashone 4 ай бұрын
awesome, more like this
@cheick127
@cheick127 Жыл бұрын
A really good content
@GroupFacade9264
@GroupFacade9264 Жыл бұрын
I was just thinking gabout this, reading my mind.
@pranavpatil7748
@pranavpatil7748 Жыл бұрын
Great video John? Can you let us know which machine/image/box you are using
@grover-
@grover- Жыл бұрын
Did anyone get the link to this if it's in hack the box?
@networkmastro1402
@networkmastro1402 Жыл бұрын
thanks this is good staff
@wolfrevokcats7890
@wolfrevokcats7890 Жыл бұрын
3:12 pwncat-cs is superb replacement for netcat
@liudvikasstankus
@liudvikasstankus Жыл бұрын
this is awesome
@iCortex1
@iCortex1 Жыл бұрын
Any plans to cover the google chrome 0 day that happened a few days ago ?
@ReligionAndMaterialismDebunked
@ReligionAndMaterialismDebunked Жыл бұрын
Early in the comments. Nice! 2 hours ago!
@klanker
@klanker Жыл бұрын
more kubernetes pls
@topegpt
@topegpt Жыл бұрын
Could nod locate Gemfilr termux metasploit, help
@localhost69
@localhost69 11 ай бұрын
nice
@medamineoueslati9719
@medamineoueslati9719 15 күн бұрын
When can i find the application i want to deploy it and practice
@ReligionAndMaterialismDebunked
@ReligionAndMaterialismDebunked Жыл бұрын
Yeah, I've heard of this system before by a Norwegian, or whatever ethical hacker dude. :3
@marccheat121
@marccheat121 Жыл бұрын
Can you share link vm or image to create this k8s lab ?
@guyhavia1730
@guyhavia1730 5 ай бұрын
What is the ctf url?
@JontheRippa
@JontheRippa Жыл бұрын
👍👍👍👍
@MP-wm9gb
@MP-wm9gb Жыл бұрын
Is Docker now really secured OR there is still a breach which allows container breakout/escape?
@vq8gef32
@vq8gef32 Жыл бұрын
Hi , Is this machine on HTB? Or any where that I can try it?
@vq8gef32
@vq8gef32 Жыл бұрын
I used pwncat-cs for my HTB - better experience )
@craigblackie2034
@craigblackie2034 Жыл бұрын
There's a distinction between LFI and directory traversal - I don't believe what you had was LFI.
@craigblackie2034
@craigblackie2034 Жыл бұрын
But great videos though!
@somerandomwithacat750
@somerandomwithacat750 Жыл бұрын
Is this a VM I can play?
@bhagyalakshmi1053
@bhagyalakshmi1053 Жыл бұрын
My my language mistake but understanding never to attending after understanding again to looking you have the never misunderstanding but health problems are also more patients also I will attend
@triggerHLM
@triggerHLM Жыл бұрын
Isn't this example very constructed? In case somone exposes a shell direclty over a webinterface the game is over anyway.
@djmasnas
@djmasnas Жыл бұрын
There is no secure place in the world ! Relax and take it easy
@gawaderanjeetsandipdypit3167
@gawaderanjeetsandipdypit3167 Жыл бұрын
This guy beats Dev-ops Engineer
@user-tf9ie2re9x
@user-tf9ie2re9x Жыл бұрын
Many KZbin videos I have seen. That didn't work at all... Professional, 100% working software suggestion for audio recovery from android internal storage is required, please.
@creatorofimages7925
@creatorofimages7925 Жыл бұрын
Copy Cat
@Hackwraghav
@Hackwraghav 9 ай бұрын
Ed Sheeran
@johnreinermarcos
@johnreinermarcos Жыл бұрын
Makdkd
@stefanosbek
@stefanosbek Жыл бұрын
Highly suggest "SteamCloud" on hack the box to those wanting to get their hands on a CTF such as the one in the video
@issamafifi5545
@issamafifi5545 Жыл бұрын
I have worked for Global Cyber Security Company for more than 8 months, what I learned form your video more than what I learned form all of them 😆😆😆 thank you John >> you_are_the_best.txt
@elchinefa9524
@elchinefa9524 Жыл бұрын
As a K8S Admin very happy to see this one. I would like to try it aswell. Which CTF was it? TryhackMe?
a Hacker's Backdoor: Service Control Manager
17:49
John Hammond
Рет қаралды 91 М.
How To Pivot Through a Network with Chisel
33:45
John Hammond
Рет қаралды 120 М.
Super gymnastics 😍🫣
00:15
Lexa_Merin
Рет қаралды 97 МЛН
Is it Cake or Fake ? 🍰
00:53
A4
Рет қаралды 18 МЛН
1❤️#thankyou #shorts
00:21
あみか部
Рет қаралды 86 МЛН
MEU IRMÃO FICOU FAMOSO
00:52
Matheus Kriwat
Рет қаралды 9 МЛН
Kubernetes Security Best Practices - Ian Lewis, Google
28:53
CNCF [Cloud Native Computing Foundation]
Рет қаралды 49 М.
How Hackers Write Malware & Evade Antivirus (Nim)
24:04
John Hammond
Рет қаралды 385 М.
Do NOT Learn Kubernetes Without Knowing These Concepts...
13:01
Travis Media
Рет қаралды 230 М.
How To Test Your Security with Atomic Red Team
13:09
John Hammond
Рет қаралды 48 М.
Hunt for Hackers with Velociraptor
13:51
John Hammond
Рет қаралды 93 М.
SQLite Blind SQL Injection - HackTheBox Cyber Apocalypse CTF
35:25
John Hammond
Рет қаралды 70 М.
How Hackers Hide
20:55
John Hammond
Рет қаралды 235 М.
Hacking CI/CD (Basic Pipeline Poisoning)
22:41
John Hammond
Рет қаралды 55 М.
How To Extract Plaintext Google Chrome Passwords
10:56
John Hammond
Рет қаралды 242 М.
Super gymnastics 😍🫣
00:15
Lexa_Merin
Рет қаралды 97 МЛН