This is a full framework dedicated to Kubernetes that will help penetration testers and Red Teamers run a comprehensive and in-depth test to imitate real-life attack scenarios that are a danger to many enterprises across the world.
More than 84 percent of enterprises utilise containers in production, and more than 78 percent use Kubernetes as their container orchestration platform, according to a Cloud Native Computing Foundation (CNCF) survey.
Because of the technology’s widespread adoption, attackers must develop their Kubernetes skills.
- To assist in the protection of Kubernetes clusters against assaults, we must first understand the technology and the businesses that are being attacked.
- However, the majority of today’s technologies are focused on passively scanning the cluster for vulnerabilities, and there is a lack of coverage for more complicated attack vectors.
- These tools may allow you to see the problem, but they will not allow you to solve it.
- It’s critical to run the exploit to replicate a real-world attack in order to assess corporate network resilience.
- When an exploit is launched, the organization’s cyber event management is practised, which isn’t the case when scanning for cluster concerns.
- This can assist the business in learning how to respond when real attacks occur, determining whether its other detection systems are functioning properly, and determining what adjustments should be done.
- The new modules are being created
- For containerized environment attack vectors such breakout from a container to the host,
- kubelet attack, cluster scanning for known vulnerabilities,
- And service and port scanning.
Disclaimer: The intended use for the tool is strictly educational and should not be used for any other purpose.
Download Link: https://github.com/cyberark/kubesploit