Learn to attack or find security issues, misconfigurations, and real-world hacks within containers, Kubernetes, and cloud-native environments. Enumerate, exploit, and gain access to the workloads right from your browser. Understand how attackers think, work, and exploit security issues, and apply these learnings to detect and defend them. Also, learn best practices, defenses, and tools to mitigate, and detect in the real world. Learn the hacks, defenses, and tools. So that you can think like an attacker, and secure your Kubernetes, cloud, and container workloads right from the design, code, and architecture itself to prevent them. Use Kubernetes Goat to showcase the effectiveness of the tools, product, and solution. Also, educate the customers and share your product or tool knowledge in an interactive hands-on way.
Features
- Sensitive keys in codebases
- DIND (docker-in-docker) exploitation
- Container escape to the host system
- Helm v2 tiller to PwN the cluster
- Kubernetes namespaces bypass
- Secure network boundaries using NSP
- Securing Kubernetes Clusters using Kyverno Policy Engine
- Documentation available