Kubernetes for Pentesters Part 1
Source provenance. Raw material catalogued for the wiki ingest pipeline. Lives offline at
raw_sources/offensive-security/ingested/Kubernetes for Pentesters_ Part 1.md.
Status: integrated
Excerpt
In the first section of this multi-part practical guide, I’ll introduce you to Kubernetes (K8s) from a penetration testing perspective, including basic information, vocabulary, and how to identify and explore Kubernetes instances. Stay tuned for the next installment, where I’ll detail more vulnerabilities and attack paths. To begin, let’s discuss what Kubernetes is and some of the terminology you’…
