The kubelet is a critical security boundary in Kubernetes and any successful attack against this component is likely to lead to a wider cluster compromise for most k8s users. In this post we explore how relatively simple it is to exploit the kubelet on Google Kubernetes Engine, in its default …
Readpenetration-testing
cloud
List of Hosting Provider Penetration Testing Authorisation Forms
16 November 2016