Category: Kubernetes Security

  • Learn Practical offensive security skills in Kubernetes security.
  • Enumerate and analyze Kubernetes RBAC policies to identify lateral movement and escalation opportunities.
  • Exploit impersonation permissions to pivot between service accounts and gain unauthorized access to high-value resources.
  • Abuse RoleBindings and ClusterRoleBindings for namespace access and cluster-wide privilege escalation.
  • Harvest and replay long-lived service account tokens for persistence and stealthy movement.
  • Chain multiple vulnerabilities (RBAC gaps, misconfigured bindings, token exposure) into complete kill-chains leading to full cluster compromise.

Use coupon K8SRTA70 to get 70% OFF