skip to content
Decrypt LOL

Get Cyber-Smart in Just 5 Minutes a Week

Decrypt delivers quick and insightful updates on cybersecurity. No spam, no data sharing—just the info you need to stay secure.

Read the latest edition

Kubernetes API Access via Leaked Credentials Explained

/ 1 min read

🛠️ Understanding Kubernetes API Access Through Leaked Credentials. This article explores various methods for accessing the Kubernetes API using leaked credentials, particularly in penetration testing scenarios. It details how to identify and utilize authentication methods such as bearer tokens and X509 certificates, which can be found in various locations like container filesystems and Kubernetes node hosts. The author emphasizes the importance of recognizing valid credentials and demonstrates how to interact with the API using tools like curl and wget. Additionally, it covers the distinction between namespaced and non-namespaced resources, providing practical examples for applying and deleting YAML resources. Overall, the post serves as a guide for effectively leveraging Kubernetes API access in security assessments.

Source
{entry.data.source.title}
Original