1. Home - Kubenomicon
  2. 1. Initial access
    1. 1.1. Using cloud credentials
    2. 1.2. Compromised image In registry
    3. 1.3. Kubeconfig file
    4. 1.4. Application vulnerability
    5. 1.5. Exposed sensitive interfaces
    6. 1.6. SSH server running inside container
  3. 2. Execution
    1. 2.1. Exec inside container
    2. 2.2. New container
    3. 2.3. Application exploit (RCE) 🔗
    4. 2.4. Sidecar injection
  4. 3. Persistence
    1. 3.1. Backdoor container
    2. 3.2. Writable hostPath mount
    3. 3.3. Kubernetes cronjob
    4. 3.4. Malicious admission controller
    5. 3.5. Container service account 🔗
    6. 3.6. Static pods
  5. 4. Privilege escalation
    1. 4.1. Privileged container
    2. 4.2. Cluster-admin binding
    3. 4.3. hostPath mount 🔗
    4. 4.4. Access cloud resources 🔗
  6. 5. Defense evasion
    1. 5.1. Clear container logs
    2. 5.2. Delete events
    3. 5.3. Pod name similarity
    4. 5.4. Connect from proxy server
  7. 6. Credential access
    1. 6.1. List K8S secrets
    2. 6.2. Access node information
    3. 6.3. Container service account
    4. 6.4. Application credentials in configuration files
    5. 6.5. Access managed identity credentials
    6. 6.6. Malicious admission controller 🔗
  8. 7. Discovery
    1. 7.1. Access Kubernetes API server
    2. 7.2. Access Kubelet API
    3. 7.3. Network mapping
    4. 7.4. Exposed sensitive interfaces 🔗
    5. 7.5. Instance Metadata API 🔗
  9. 8. Lateral movement
    1. 8.1. Access cloud resources 🔗
    2. 8.2. Container service account 🔗
    3. 8.3. Cluster internal networking
    4. 8.4. Application credentials in configuration files 🔗
    5. 8.5. Writable hostPath mount 🔗
    6. 8.6. CoreDNS poisoning
    7. 8.7. ARP poisoning and IP spoofing
  10. 9. Collection
    1. 9.1. Images from a private registry
    2. 9.2. Collecting data from pod
  11. 10. Impact
    1. 10.1. Data destruction
    2. 10.2. Resource hijacking
    3. 10.3. Denial of service
  12. 11. Fundamentals
    1. 11.1. Nodes
    2. 11.2. Services
    3. 11.3. etcd
    4. 11.4. RBAC
    5. 11.5. Kubelet
    6. 11.6. Namespaces
    7. 11.7. Secrets
    8. 11.8. Interesting Files
  13. Contributing
  14. Pentesting Kubernetes

The Kubenomicon

Access Cloud Resources

See Credential Access -> Access managed identity credentials