Open
Description
This scenario will show how an attacker can leverage Kubelet API endpoint to gaining privileges access into a cluster.
https://labs.f-secure.com/blog/attacking-kubernetes-through-kubelet/
Metadata
Metadata
Assignees
Labels
Projects
Status
🌳 Backlog