Please enable JavaScript or contact us at
kontrasupport@securitycompass.com
KONTRA
console
console
@@@showControlledTooltip: { text: "<p>The environmental variables contain all the variables, which are typically found on the container that is managed by <strong style=\"color: rgb(247, 218, 100);\">Kubernetes</strong>. </p>", pos: "0:23" }
x
root@cc00:/
#
You’ll need a computer for this.
To experience our interactive tutorials in full, please log-in with a desktop browser.
1. Scenario
2. Kubectl Download
3. Executing Kubectl
4. K8s Permissions Check
5. Privileged Container
6. List Pods
7. Remote Access
8. List Mount Content
9. /etc/shadow
10. John the Ripper (JtR)
11. Brute-Force Attack
12. Vulnerability
13. Mitigation - RBAC Police
Powered by Verifalia -
email checker