Hi friends, This configuration assumes that you have anough privilege to deploy pod to the cluster. There are many ways to gather initial information propbably
Cyber Security Architect | Red/Blue Teaming | Exploit/Malware Analysis
by Rio Asmara Suryadi
Hi friends, This configuration assumes that you have anough privilege to deploy pod to the cluster. There are many ways to gather initial information propbably
Hi Brother, Another privilege escalation using docker or sandbox escape. The methodology is the same which we need to start a docker image with privileged
Hi Pentester, Today virtualization with docker is getting interesting for most of the developer to race on making their application compatible to run within docker.
Hi Pentester, I want to share a post exploitation of privilege escalation on the Boot2Docker virtualization. Missed configuration lead to the success of this exploitation.
Another day playing with JWT. I found another way to compromise JWT session during my pentest exercise. During the web enumeration, I found that the
Hi, It is play time. I did hacking exercise to update my knowledge and keep me busy during the weekend. I did small pentest to