From 57961899712c634fa5bdeb0ecd4795cf2a116c87 Mon Sep 17 00:00:00 2001 From: 0xalwayslucky <0xalwayslucky@protonmail.com> Date: Thu, 27 May 2021 22:35:31 +0200 Subject: [PATCH] Kubernetes: escaping a pod; hotfix format --- pentesting/pentesting-kubernetes/enumeration-from-a-pod.md | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/pentesting/pentesting-kubernetes/enumeration-from-a-pod.md b/pentesting/pentesting-kubernetes/enumeration-from-a-pod.md index 630a5f99..24bb32df 100644 --- a/pentesting/pentesting-kubernetes/enumeration-from-a-pod.md +++ b/pentesting/pentesting-kubernetes/enumeration-from-a-pod.md @@ -294,7 +294,7 @@ spec: restartPolicy: Never ``` -[Original source](https://gist.github.com/abhisek/1909452a8ab9b8383a2e94f95ab0ccba) +[original yaml source](https://gist.github.com/abhisek/1909452a8ab9b8383a2e94f95ab0ccba) After that you create the pod @@ -317,8 +317,8 @@ chroot /root /bin/bash ``` -Information obtained from: -[Kubernetes Namespace Breakout using Insecure Host Path Volume — Part 1](https://blog.appsecco.com/kubernetes-namespace-breakout-using-insecure-host-path-volume-part-1-b382f2a6e216) +Information obtained from:\ +[Kubernetes Namespace Breakout using Insecure Host Path Volume — Part 1](https://blog.appsecco.com/kubernetes-namespace-breakout-using-insecure-host-path-volume-part-1-b382f2a6e216)\ [Attacking and Defending Kubernetes: Bust-A-Kube – Episode 1](https://www.inguardians.com/attacking-and-defending-kubernetes-bust-a-kube-episode-1/)