Kubernetes Security Basics: From a Pentester’s Point of View
Explore Kubernetes security from a pentester’s point of view. Follow a hands-on walkthrough from reconnaissance to root access, focusing on network packet analysis, exploitation techniques, and cluster misconfigurations