Kubernetes Pentest Methodology :-
Part 1:-
https://t.co/dEMDs8nTfH
Part 2:-
https://t.co/MvhDBBBqw2
Part 3:-
https://t.co/ZkaQyai53W
Part 1:-
https://t.co/dEMDs8nTfH
Part 2:-
https://t.co/MvhDBBBqw2
Part 3:-
https://t.co/ZkaQyai53W
CyberArk
Kubernetes Pentest Methodology Part 1 | CyberArk
As the pace of life accelerates, we spend less time waiting or in downtime. Kubernetes offers something similar for our life with technology. It is a container orchestration platform that offers an easy, automated way...
Automated Docker TCP Socket Host Takeover : https://t.co/k45lyTaMi3
GitHub
AbsoZed/DockerPwn.py
Python automation of Docker.sock abuse. Contribute to AbsoZed/DockerPwn.py development by creating an account on GitHub.
Presentation of HTTP Desync Attacks will be at Black Hat Europe next week. New content includes a novel desync technique, major automation improvements, a defensive case-study, and updated bounty figures https://t.co/QCKbOqg1aZ
Blackhat
Black Hat Europe 2019
Check if a server is running any vulnerable services
wget https://raw(.)githubusercontent(.)com/vulnersCom/nmap-vulners/master/vulners.nse -O /usr/share/nmap/scripts/vulners.nse && nmap --script-updatedb
All done, now you can do a scan with
nmap -sV --script vulners <target>
wget https://raw(.)githubusercontent(.)com/vulnersCom/nmap-vulners/master/vulners.nse -O /usr/share/nmap/scripts/vulners.nse && nmap --script-updatedb
All done, now you can do a scan with
nmap -sV --script vulners <target>