Post-Exploiting a Compromised ETCD - Luis Toro Puig, NCC Group
后利用被入侵的ETCD | Post-Exploiting a Compromised ETCD - Luis Toro Puig, NCC Group
在一个ETCD(容器或主机)被入侵的情况下,你能做到多远?了解k8s如何向ETCD注入数据可能有助于我们篡改数据,注入恶意Pod,获得集群中的持久性,甚至绕过调度逻辑和AdmissionController的限制。
Giving an scenario on which an ETCD (container or host) was compromised, how far you will get? Understanding how k8s inject data in ETCD may help us to tamper data, inject malicious pods, gain persistence in the cluster or even bypass the scheduler logic and the AdmissionController restrictions.
CNCF概况(幻灯片)
扫描二维码联系我们!
CNCF (Cloud Native Computing Foundation)成立于2015年12月,隶属于Linux Foundation,是非营利性组织。
CNCF(云原生计算基金会)致力于培育和维护一个厂商中立的开源生态系统,来推广云原生技术。我们通过将最前沿的模式民主化,让这些创新为大众所用。请关注CNCF微信公众号。