Kubernetes Goat Logo Kubernetes Goat
  • Introduction
  • Sensitive keys in code bases
  • DIND (docker-in-docker) exploitation
  • SSRF in K8S world
  • Container escape to access host system
  • Docker CIS Benchmarks analysis
  • Kubernetes CIS Benchmarks analysis
  • Attacking private registry
  • NodePort exposed services
  • Helm v2 tiller to PwN the cluster
  • Analysing crypto miner container
  • Kubernetes Namespaces bypass
  • Gaining environment information
  • DoS the memory/cpu resources
  • Hacker Container preview
  • Hidden in layers
  • RBAC Least Privileges Misconfiguration
  • KubeAudit - Audit Kubernetes Clusters
  • Sysdig Falco - Runtime Security Monitoring & Detection
  • Popeye - A Kubernetes Cluster Sanitizer
  • Secure network boundaries using NSP
Kubernetes Goat Logo

Welcome to Kubernetes Goat. This is the home for exploring your Kubernetes Goat scenarios, discovery, exploitation, attacks, endpoints, etc.