white2hack 📚 – Telegram
white2hack 📚
13.3K subscribers
4.8K photos
135 videos
1.96K files
2.26K links
Кибербез. Книги, гайды, how to, ликбез. Аналитика, тренды, карьера, эвенты. Этичный хакинг и защита своих данных

🔊 Связь @w2hack_feed_bot
💬 Чат https://news.1rj.ru/str/+VdkEIWudTi5m3dsA
💡 Консультация https://forms.gle/iB9iX3BwyxJM4Ktx5
🏛 Обмен -- private --
Download Telegram
Forwarded from CyberSecBastion
Attacking Kubernetes with security best practices, v.1 (Apr 15, 2024)

Securing Kubernetes begins with a comprehensive understanding of its architecture and potential attack vectors. From ensuring proper authentication and authorization mechanisms to implementing network policies and encryption protocols, a layered approach to defense is indispensable. Moreover, continuous monitoring, timely updates, and adherence to industry standards such as CIS benchmarks are fundamental in maintaining the integrity and resilience of Kubernetes clusters.

By integrating these security measures into the development and operational workflows, organizations can bolster their defenses and thwart potential threats aimed at compromising Kubernetes environments.

#K8s
👍3🔥2
Forwarded from CyberSecBastion
Attacking Kubernetes_2024.pdf
1.9 MB
Attacking Kubernetes with security best practices, v.1 (Apr 15, 2024)
👍4🔥2
Forwarded from CyberSecBastion
Kubenomicon

The Kubenomicon was born of a desire to understand more about Kubernetes from an offensive perspective.

This project was heavily inspired by the Kubernetes Threat Matrix from Microsoft which is a great starting point as it provides a framework to help understand some of the concepts in a MITRE ATTACK style framework. The Microsoft Threat Matrix was explicitly not designed to be a playbook offensive for security professionals and thus it lacks the details necessary to actually exploit (and remediate) each attack in Kubernetes cluster.

Source

Extra
K8s penetration test
HackTricks Cloud
Pentesting CI/CD

#K8s
🔥7
Structure of URL

#web
👍123
What vulns are in this and how would you exploit them?

PHP code

Text your idea on comments of the post

#AppSec
🔥71
Implementing DevSecOps Practices. Supercharge your software security with DevSecOps excellence by Vandana Verma Sehgal, 2023

Get to grips with application security, secure coding, and DevSecOps practices to implement in your development pipeline

DevSecOps is built on the idea that everyone is responsible for security, with the goal of safely distributing security decisions at speed and scale to those who hold the highest level of context. This practice of integrating security into every stage of the development process helps improve both the security and overall quality of the software.

This book will help you get to grips with DevSecOps and show you how to implement it, starting with a brief introduction to DevOps, DevSecOps, and their underlying principles.

#book #SecDevOps
👍5
Packt.Implementing.DevSecOps.Practices.pdf
12.2 MB
Implementing DevSecOps Practices. Supercharge your software security with DevSecOps excellence by Vandana Verma Sehgal, 2023
👍5🔥1
Useful CLI Tools for Linux Admin by Dan Nanni

#linux
🔥7👍1
Privilege Escalation Attacks by Dan Nanni, 2024

#linux #pentest
🔥7😁2
World Password Day 2024

Thursday, May 2, 2024, is World Password Day.

Established in 2013, the event is observed on the first Thursday of May with the goal of improving awareness of the importance of creating complex and unique passwords and adopting password best practices to keep sensitive information private and confidential

#fun
🎉6👍3
Certified Ethical Hacking (CEH) notes, 2024

I express my gratitude to the author for producing such valuable notes for CEH

#exam
👍7
Certified_Ethical_Hacking notes_2024.pdf
1.9 MB
Certified Ethical Hacking (CEH) notes, 2024
👍3🔥1
Firmware Security Testing Methodology by OWASP, 2024

The Open Web Application Security Project (OWASP) is an open community dedicated to enabling organizations to develop, purchase, and maintain applications that can be trusted.

#penter #hardware
👍7🔥1
Firmware_Security_Testing_Methodology_Version1.pdf
3.3 MB
Firmware Security Testing Methodology by OWASP, 2024
🔥11
😺😺😺

#fun
😁20👍4🤣3
Reset Password Vulnerabilities Testing Methods by Shubham Rooter, 2024

#web
👍2🔥1
Reset Password Vulnerabilities Testing Methods.pdf
53.6 KB
Reset Password Vulnerabilities Testing Methods by Shubham Rooter, 2024
🔥11