Kube-hunter is an open source application written in Python that explores how a Kubernetes cluster responds to various network requests and whether this highlights any security-related issues or misconfigurations. These tests replicate what an attacker might do in an attempt to gain a foothold in your cluster.
Liz Rice explores how some of these interesting attacks might work—if your cluster is misconfigured—by issuing network requests in a live demonstration. You’ll see how Kubernetes misconfigurations could be exploited to gain access to your hosts, your containers, and potentially even your customer data.
Liz Rice is the technology evangelist at container security specialists Aqua Security and coauthor of the O’Reilly report Kubernetes Security. She has a wealth of software development, team, and product management experience from her years spent working on network protocols and distributed systems and in digital technology sectors such as video on demand (VOD), music, and voice over internet protocol (VoIP). When not building startups and writing code, Liz loves riding bikes in places with better weather than her native London or racing in virtual reality on Zwift.
©2019, O'Reilly Media, Inc. • (800) 889-8969 or (707) 827-7019 • Monday-Friday 7:30am-5pm PT • All trademarks and registered trademarks appearing on oreilly.com are the property of their respective owners. • email@example.com