You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository has been archived by the owner on Mar 28, 2023. It is now read-only.
A Malicious Internal User is a user, such as an administrator or developer, who uses their privileged position maliciously against the system, or stolen credentials used for the same. The scenario is more focused on what logging/auditing/roles/NAC can do to prevent such credential abuse.
Setup
create a malicious user
map what kops & kubespray look like from the host perspective
discover components and what they leak from this perspective as well
map what components a reasonably-permissioned attacker may have access to
non-repudiation throughout the system (are there logging gaps?)
I wish to exfil secrets
what secrets do I have access to by default
can I move laterally to gain access to other secrets
I wish to add resources
can I modify a resource to establish a beachhead without alerting other admins/users
can I deploy resources without alerting other admins
I wish to punch holes in system security
port forwarding without anyone noticing
breaking down restrictions/filters without alert
The text was updated successfully, but these errors were encountered:
Overview
A Malicious Internal User is a user, such as an administrator or developer, who uses their privileged position maliciously against the system, or stolen credentials used for the same. The scenario is more focused on what logging/auditing/roles/NAC can do to prevent such credential abuse.
Setup
I wish to exfil secrets
I wish to add resources
I wish to punch holes in system security
The text was updated successfully, but these errors were encountered: