1 link tagged with all of: kubernetes + aws + eks + exploitation + security
Links
The article explores security vulnerabilities in AWS EKS by deploying misconfigured Kubernetes pods. It demonstrates how an attacker can escape from a compromised pod to gain root access on the host and potentially access other services. The focus is on the implications of specific dangerous configurations and their exploitation.
aws ✓
eks ✓
kubernetes ✓
security ✓
exploitation ✓