Demo
This walkthrough describes an example environment used during a security workshop focused on teaching how to run a manual penetration testing in a Kubernetes environment. This environment is comprised of:
- 3 namespaces (
prod
,sauron
, andjack
) - 3 initial pods (
sam
,frodo
, andjackpot
) - An entrypoint website
Deploy
To deploy the environment, it is necessary to use the files provided here. Execute the following to start the environment:
After the environment is properly setup, you can start the penetration testing from inside sam
pod by running the following command:
Your goal is to reach the underlying worker node and find the /etc/kubernetes/kubelet.conf
file.
Using KAET
As the manual penetration testing of this environment is cumbersome, we can use KAET to explore the aforementioned environment. For this we need to get sam's service account token and the Kubernetes server URL:
Running KAET
If you desire the output to be silenced or verbose, select -s
or -v
respectively.