Udemy
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
Development
Web Development Data Science Mobile Development Programming Languages Game Development Database Design & Development Software Testing Software Engineering Development Tools No-Code Development
Business
Entrepreneurship Communications Management Sales Business Strategy Operations Project Management Business Law Business Analytics & Intelligence Human Resources Industry E-Commerce Media Real Estate Other Business
Finance & Accounting
Accounting & Bookkeeping Compliance Cryptocurrency & Blockchain Economics Finance Finance Cert & Exam Prep Financial Modeling & Analysis Investing & Trading Money Management Tools Taxes Other Finance & Accounting
IT & Software
IT Certification Network & Security Hardware Operating Systems Other IT & Software
Office Productivity
Microsoft Apple Google SAP Oracle Other Office Productivity
Personal Development
Personal Transformation Personal Productivity Leadership Career Development Parenting & Relationships Happiness Esoteric Practices Religion & Spirituality Personal Brand Building Creativity Influence Self Esteem & Confidence Stress Management Memory & Study Skills Motivation Other Personal Development
Design
Web Design Graphic Design & Illustration Design Tools User Experience Design Game Design Design Thinking 3D & Animation Fashion Design Architectural Design Interior Design Other Design
Marketing
Digital Marketing Search Engine Optimization Social Media Marketing Branding Marketing Fundamentals Marketing Analytics & Automation Public Relations Advertising Video & Mobile Marketing Content Marketing Growth Hacking Affiliate Marketing Product Marketing Other Marketing
Lifestyle
Arts & Crafts Beauty & Makeup Esoteric Practices Food & Beverage Gaming Home Improvement Pet Care & Training Travel Other Lifestyle
Photography & Video
Digital Photography Photography Portrait Photography Photography Tools Commercial Photography Video Design Other Photography & Video
Health & Fitness
Fitness General Health Sports Nutrition Yoga Mental Health Dieting Self Defense Safety & First Aid Dance Meditation Other Health & Fitness
Music
Instruments Music Production Music Fundamentals Vocal Music Techniques Music Software Other Music
Teaching & Academics
Engineering Humanities Math Science Online Education Social Science Language Teacher Training Test Prep Other Teaching & Academics
AWS Certification Microsoft Certification AWS Certified Solutions Architect - Associate AWS Certified Cloud Practitioner CompTIA A+ Cisco CCNA Amazon AWS CompTIA Security+ AWS Certified Developer - Associate
Graphic Design Photoshop Adobe Illustrator Drawing Digital Painting InDesign Character Design Canva Figure Drawing
Life Coach Training Neuro-Linguistic Programming Personal Development Mindfulness Personal Transformation Meditation Life Purpose Coaching Emotional Intelligence
Web Development JavaScript React CSS Angular PHP WordPress Node.Js Python
Google Flutter Android Development iOS Development Swift React Native Dart Programming Language Mobile Development Kotlin SwiftUI
Digital Marketing Google Ads (Adwords) Social Media Marketing Google Ads (AdWords) Certification Marketing Strategy Internet Marketing YouTube Marketing Email Marketing Retargeting
SQL Microsoft Power BI Tableau Business Analysis Business Intelligence MySQL Data Analysis Data Modeling Data Cleaning
Business Fundamentals Entrepreneurship Fundamentals Business Strategy Online Business Business Plan Startup Freelancing Blogging Home Business
Unity Game Development Fundamentals Unreal Engine C# 3D Game Development C++ 2D Game Development Unreal Engine Blueprints Blender
30-Day Money-Back Guarantee

This course includes:

  • 4 hours on-demand video
  • 1 article
  • 2 downloadable resources
  • Full lifetime access
  • Access on mobile and TV
IT & Software Network & Security Cyber Security

Hacking and Securing Kubernetes Clusters

Learn how to attack and defend kubernetes clusters
Rating: 4.5 out of 54.5 (17 ratings)
69 students
Created by The Offensive Labs, Srinivas .
Last updated 6/2020
English
English [Auto]
30-Day Money-Back Guarantee

What you'll learn

  • Students will learn different kubernetes components
  • Students will learn fundamentals of role based access controls in Kubernetes
  • Students will learn how service accounts work in Kubernetes
  • Students will learn the basics of Roles, Role Bindings, Cluster Roles, Cluster Role Bindings
  • Students will understand the Kubernetes Attack Surface
  • Students will learn how a misconfigured Kubernetes Cluster can be exploited by attackers
  • Students will learn how to attack the API Server using insecure port
  • Students will learn how to attack a misconfigured Kubelet API
  • Students will learn how ETCD storage works
  • Students will learn how exposed Kubernetes Dashboard can be abused
  • Students will learn how to perform Static Analysis of YAML files using Kube-audit
  • Students will learn how to perform Static Analysis using Kubesec
  • Students will learn how to perform Security Assessments using Kube-hunter
  • Students will learn how to audit clusters using Kube-bench
  • Students will learn how to scan Docker images using trivy
  • Students will learn how to implement network policies
  • Students will learn how to use Kubernetes Security Context to prevent attacks

Requirements

  • The course begins from basics
  • Its good to have Docker knowledge

Description

Kubernetes security, to some people is a complex subject because of the overwhelming jargon and the complex setup it requires to have a multi node cluster especially when you are doing it for the first time. The goal of this Course is to make things clearer and easier for those who are new to Kubernetes and Kubernetes security world.

Who this course is for:

  • Security Professionals who are into Kubernetes
  • Cloud Engineers
  • Devops Professionals
  • Penetration testers
  • Red team members
  • Anyone who is interested in ethical hacking and penetration testing
  • Anyone who is interested in information security concepts

Course content

5 sections • 45 lectures • 4h 2m total length

  • Preview01:22

  • What is Kubernetes
    02:00
  • Fundamentals of Kubernetes
    00:25
  • Required Virtual Machine Downloads
    03:13
  • Instructor's Lab setup
    01:48
  • Downloadable files for lab setup
    00:02
  • Setting up a Kubernetes Cluster
    11:43
  • Verify the setup
    00:45
  • Common Kubernetes Terms
    05:44
  • Understanding various Kubernetes components
    05:38
  • Deploying the vulnerable Application
    13:54
  • An introduction to Kubectl
    08:22

  • Introduction
    00:52
  • Kubernetes Attack Surface
    04:05
  • Role Based Access Controls - Part 1
    04:19
  • Role Based Access Controls - Part 2
    11:16
  • Role Based Access Controls - Part 3
    08:29
  • Misconfiguring our cluster
    03:38
  • Getting started with pentesting a Kubernetes cluster- NMAP
    02:14
  • Initial foot hold through Remote Command Execution
    07:10
  • Post Exploitation - Enumeration
    03:15
  • Preview06:49
  • Post Exploitation - Interacting with containers in the cluster
    05:51
  • Getting access to the underlying host - Compromising the worker node
    05:58
  • Getting access to the underlying host - Compromising the master node
    04:01
  • Full cluster compromise - Summary of the attack
    01:00
  • Misconfiguring and Attacking the API Server
    10:31
  • Misconfiguring and Attacking the Kubelet API
    09:31
  • Exploring and abusing etcd storage
    12:04
  • Misconfiguring and Attacking exposed Kubernetes Dashboards
    13:15

  • Introduction to automated tools
    00:46
  • Kube bench
    08:16
  • Kube hunter
    03:52
  • Trivy
    04:17
  • Kube audit
    04:03
  • Kubesec
    03:39

  • Introduction
    01:25
  • Limiting Network Exposure
    01:45
  • Use of Authorization
    04:20
  • Introduction to Secrets
    02:01
  • Introduction to Admission Controllers
    02:54
  • Implementing Network Policies to limit the attack surface
    10:58
  • Using Security Context to harden the containers
    14:18
  • Preview06:30
  • Hardening using Seccomp profiles
    04:06

Instructors

The Offensive Labs
A Training Brand
The Offensive Labs
  • 4.5 Instructor Rating
  • 17 Reviews
  • 69 Students
  • 1 Course

We have developed The Offensive Labs after being in the field for more than a decade and engaging with over 30k+ happy students both offline and online from 50+ countries. We know what it takes to bring your skills to the next level. The courses are built with little fluff and more value. Don't trust us! Trust our happy students and their words.

Srinivas .
Your instructor
Srinivas .
  • 4.4 Instructor Rating
  • 1,184 Reviews
  • 23,900 Students
  • 12 Courses

Srinivas is an Infosec professional with interest in teaching information security concepts. He is an OSCP and OSCE. He has extensive experience in penetration testing web, network and mobile apps. The aim of these courses is giving the best quality infosec courses at an affordable price. All of these courses contain hands on labs and very detailed explanations.

  • Udemy for Business
  • Teach on Udemy
  • Get the app
  • About us
  • Contact us
  • Careers
  • Blog
  • Help and Support
  • Affiliate
  • Terms
  • Privacy policy
  • Cookie settings
  • Sitemap
  • Featured courses
Udemy
© 2021 Udemy, Inc.