Beginner Lab red team icon   aws

Exploit Kubernetes Overly Permissive RBAC

Join us as we explore the risks of overly permissive Role-Based Access Control (RBAC) in Kubernetes with this hands-on lab. Learn how misconfigurations can expose your cluster to security threats, and gain the skills to identify, exploit, and remediate RBAC vulnerabilities, ensuring your clusters remain locked down and secure.

Scenario

Your company has been hired to perform a pentest on a new client's digital infrastructure. After some initial reconnaissance, you discover that you have access to an EC2 instance with compromised credentials. This instance might serve as a gateway to their Kubernetes environment. Your mission is to leverage these credentials, explore potential vulnerabilities, and exploit weaknesses in their Kubernetes setup to ultimately gain root-level access to their servers.

Lab prerequisites
  • Basic Linux knowledge
  • Foundational knowledge of Kubernetes concepts
  • Familiarity with Containerisation and Kubernetes orchestration
  • Familiarity with common web attacks
Learning outcomes
  • You will be able to identify and exploit Kubernetes-specific insecure configurations and how to exploit these to perform lateral movement and escalate privileges.
  • Gain awareness of how to prevent making the same mistakes
Real-world context

Workload-related and RBAC (Role-Based Access Control) misconfigurations are frequent issues in Kubernetes environments. According to a recent Red Hat survey, nearly 90% of organizations experienced at least one container or Kubernetes security incident in the past year. This highlights the critical need for robust security practices and vigilance in managing Kubernetes clusters.

platform mock(1)

Cloud Security Training To Protect Your Business

Pwned Labs for Business gives your team access to dedicated business content, including labs and cyber ranges.

We also offer in-person or remote workshops, and our cloud penetration services are helping businesses become more secure!