How hackers run C2 agents on your Kubernetes cluster?

How hackers run C2 agents on your Kubernetes cluster?

Who says C2 frameworks are only used for traditional systems?

In this video, I will show you how a C2 framework like kubesploit can be used to automate k8s attacks and how hackers use them to control your kubernetes clusters.

Do note that kubesploit is no longer maintained but I’m keen to know for any alternatives.

Aside from attacking k8s, I will show you also how a runtime security tool like NeuVector can detect and prevent malicious activities.

// Chapters

0:00 – Intro
0:45 – K8s 101 (you may skip this if you are a k8s god)
2:00 – Attacking using kubesploit
2:33 – Local k8s setup using KIND
3:31 – Kubesploit preparation
4:44 – Attacking my local K8s
5:43 – Mount container breakout attack
6:20 – Mount container breakout attack (theory)
6:51 – CVE scan
7:28 – How does a C2 agent get planted in k8s?
8:15 – Hunting for malicious activities using NeuVector

// Links

* Collection of misconfigured pods: https://github.com/BishopFox/badPods/tree/main
* Kind cluster: https://kind.sigs.k8s.io/
* kubesploit: https://github.com/cyberark/kubesploit
* Neuvector: https://open-docs.neuvector.com/