CHAPTER 30

Hacking on Kubernetes

In this chapter, we cover the following topics:

•   Kubernetes architecture

•   Fingerprinting Kubernetes API Servers

•   Getting access to Kubernetes internals

•   Moving laterally

In this chapter, we will talk about one of the newest technologies, maybe the hottest technology, to come around since virtualization started. If a container is the equivalent of a virtual machine in its use, then Kubernetes is equivalent to the VMware vSphere system. Kubernetes has changed the way many organizations have been able to package and deliver software. Strangely enough, most of the Kubernetes distributions1 and systems are not deployed on bare metal. They are generally deployed on existing virtualization hardware, ...

Get Gray Hat Hacking: The Ethical Hacker's Handbook, Sixth Edition, 6th Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.