kubernetes goat: “Vulnerable by Design” Kubernetes Cluster

Kubernetes Goat

The Kubernetes Goat designed to be an intentionally vulnerable cluster environment to learn and practice Kubernetes security.

Kubernetes Goat

🏁 Scenarios

  1. Sensitive keys in codebases
  2. DIND (docker-in-docker) exploitation
  3. SSRF in the Kubernetes (K8S) world
  4. Container escape to the host system
  5. Docker CIS benchmarks analysis
  6. Kubernetes CIS benchmarks analysis
  7. Attacking private registry
  8. NodePort exposed services
  9. Helm v2 tiller to PwN the cluster – [Deprecated]
  10. Analyzing crypto miner container
  11. Kubernetes namespaces bypass
  12. Gaining environment information
  13. DoS the Memory/CPU resources
  14. Hacker container preview
  15. Hidden in layers
  16. RBAC least privileges misconfiguration
  17. KubeAudit – Audit Kubernetes clusters
  18. Falco – Runtime security monitoring & detection
  19. Popeye – A Kubernetes cluster sanitizer
  20. Secure network boundaries using NSP

Install &  Use

Copyright (c) 2020 Madhu Akula