Replies: 2 comments
-
|
Persistência
|
Beta Was this translation helpful? Give feedback.
0 replies
-
|
Reconhecimento Interno
|
Beta Was this translation helpful? Give feedback.
0 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
-
Objetivo: Simular atividades maliciosas avançadas dentro de clusters Kubernetes para avaliar resiliência, detecção e resposta da equipe de segurança.
Deploy furtivo via CRDs ou sidecars maliciosos
Uso de workloads camufladas: imagens com nome similar a serviços legítimos (nginx-secure, monitoring-exporter)
Exploração de RBAC fraco: deploy usando ServiceAccounts com permissões excessivas
Kube API abuse: autenticação com tokens vazados ou montagem de service account toke
Beta Was this translation helpful? Give feedback.
All reactions