Containers offer speed, performance, and portability, but do they actually contain? While they try their best, with the rapid growth of cloud-native containers, several Cloud Service Providers are deploying Kubernetes in production to support customer multitenancy in their Serverless and CaaS offerings. Are they actually contain? Where is the weakness and how to exploit it?
This talk describes the best practices of our Kubernetes Redteam – the technical details of how to takeover cloud-native k8s cluster step-by-step. We will walk through real cases to show the state-of-the-art k8s attack techniques.
During this session we will publish a main release of our open-sourced container penetration tool: CDK. It comes with many powerful PoCs/EXPs and system tools, helps you to escape container and takeover K8s cluster easily. We will demonstrate a full-chain attack with CDK.