Walking the Risky Path: The Threat of hostPath to Your Kubernetes Cluster

Reem Rotenberg<
By: Reem Rotenberg
Apr 1, 2024

In this blog, we will shed light on hostPath potential risks, delving into the depths of risky hostPath use cases and how they can compromise the security of your cluster if not carefully managed. IntroBackgroundHow Does hostPath Work?Security ImpactAttack Scenarios/var/log directory mounted/etc/kubernetes/manifests directory mounted/var/run/containerd/containerd.sock socket mounted/var/lib/kubelet/pods directory mounted/proc/sys/kernel/core_pattern file mounted/ directory mountedConclusionAppendices Intro In today's cloud technology landscape, Kubernetes is widely used to orchestrate containerized…

7 Ways to Escape a Container

7 Ways to Escape a Container

Ori Abargil<
By: Ori Abargil
Aug 28, 2023

Opening In today's modern environment, where containers have become the go-to solution for application deployments, the security of these containers has emerged as a critical concern. In fact, containers have become the primary attack surface in many scenarios. In this post, we will delve into container escapes, exploring seven common techniques that can be used to breach container boundaries. For each escape technique, we will…