Article: Kubernetes: unauth kublet API 10250 basic code exec - published almost 6 years ago. Content: Unauth API access (10250)Most Kubernetes deployments provide authentication for this port. But it’s still possible to expose it inadvertently and it's still pretty common to find it exposed via the "insecure API service" option.Everybody who has access to the service kubelet port (10250), even without a certificate, can execute any command inside the contain... https://blog.carnal0wnage.com/2019/01/kubernetes-unauth-kublet-api-10250.html Published: 2019 01 16 14:00:00 Received: 2021 06 06 09:05:30 Feed: Carnal0wnage and Attack Research Blog Source: Carnal0wnage and Attack Research Blog Category: News Topic: Hacking |
Article: Kubernetes: unauth kublet API 10250 token theft & kubectl - published almost 6 years ago. Content: Kubernetes: unauthenticated kublet API (10250) token theft & kubectl access & execkube-hunter output to get us started: do a curl -s https://k8-node:10250/runningpods/ to get a list of running podsWith that data, you can craft your post request to exec within a pod so we can poke around. Example request:curl -k -XPOST "https://k8-node:10250/run/kube-... https://blog.carnal0wnage.com/2019/01/kubernetes-unauth-kublet-api-10250_16.html Published: 2019 01 16 14:00:00 Received: 2021 06 06 09:05:30 Feed: Carnal0wnage and Attack Research Blog Source: Carnal0wnage and Attack Research Blog Category: News Topic: Hacking |
|
Article: Kubernetes: Kube-Hunter 10255 - published almost 6 years ago. Content: Below is some sample output that mainly is here to see what open 10255 will give you and look like. What probably of most interest is the /pods endpointor the /metrics endpointor the /stats endpoint $ ./kube-hunter.pyChoose one of the options below:1. Remote scanning (scans one or more specific IPs or DNS names)2. Subnet scanning (scans subnets ... https://blog.carnal0wnage.com/2019/01/kubernetes-kube-hunter-10255.html Published: 2019 01 16 14:00:00 Received: 2021 06 06 09:05:30 Feed: Carnal0wnage and Attack Research Blog Source: Carnal0wnage and Attack Research Blog Category: News Topic: Hacking |
|
Article: NCSC website accessibility is key - published almost 6 years ago. Content: https://www.ncsc.gov.uk/blog-post/ncsc-website-accessibility-is-key Published: 2019 01 16 04:28:26 Received: 2023 12 15 13:02:24 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
Article: NCSC Cross Domain Solutions industry pilot - published almost 6 years ago. Content: https://www.ncsc.gov.uk/blog-post/ncsc-cross-domain-solutions-industry-pilot Published: 2019 01 16 00:00:00 Received: 2021 04 18 14:04:46 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: Oracle Critical Patch Update Advisory - January 2019
- published almost 6 years ago. Content: https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html Published: 2019 01 15 19:30:54 Received: 2021 06 06 09:03:27 Feed: Oracle Security Alerts Source: Oracle Security Alerts Category: Alerts Topic: Vulnerabilities |
Article: QR Codes - what's the real risk? - published almost 6 years ago. Content: https://www.ncsc.gov.uk/blog-post/qr-codes-whats-real-risk Published: 2019 01 15 15:26:19 Received: 2024 05 25 05:03:13 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: Developers need help too - published almost 6 years ago. Content: https://www.ncsc.gov.uk/blog-post/developers-need-help-too Published: 2019 01 15 09:39:28 Received: 2024 04 10 12:43:01 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: Establishing a council for the cyber security profession - published almost 6 years ago. Content: https://www.ncsc.gov.uk/blog-post/establishing-a-council-for-the-cyber-security-profession Published: 2019 01 15 00:00:00 Received: 2021 04 18 14:04:46 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
Article: Kubernetes: List of ports - published almost 6 years ago. Content: Other Kubernetes ports What are some of the visible ports used in Kubernetes? 44134/tcp - Helmtiller, weave, calico 10250/tcp - kubelet (kublet exploit) No authN, completely open /pods /runningpods /containerLogs 10255/tcp - kublet port (read-only) /stats /metrics /pods 4194/tcp - cAdvisor 2379/tcp - etcd (see it on other ports though) Etcd hold... https://blog.carnal0wnage.com/2019/01/kubernetes-list-of-ports.html Published: 2019 01 14 21:31:00 Received: 2023 03 31 08:24:33 Feed: Carnal0wnage and Attack Research Blog Source: Carnal0wnage and Attack Research Blog Category: News Topic: Hacking |
|
Article: Dokany/Google Drive File Stream Kernel Stack-based Buffer Overflow Vulnerability - published almost 6 years ago. Content: Last November I reported a kernel vulnerability to CERT/CC for their help in coordinating the disclosure as it impacted dozens of vendors including Google Drive File Stream (GDFS). The vulnerability was a stack-based buffer overflow in Dokany’s kernel mode file system driver and has been assigned cve id of CVE-2018-5410. With Dokany you can create your own v... https://www.greyhathacker.net/?p=1041 Published: 2019 01 14 18:07:01 Received: 2022 05 11 19:26:43 Feed: GreyHatHacker.NET Source: GreyHatHacker.NET Category: Cyber Security Topic: Cyber Security |
|
Article: The serious side of pranking - published almost 6 years ago. Content: https://www.ncsc.gov.uk/blog-post/serious-side-pranking Published: 2019 01 14 15:25:42 Received: 2024 01 18 10:22:53 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
Article: Joint report on publicly available hacking tools - published almost 6 years ago. Content: httpss://www.ncsc.gov.uk/report/joint-report-on-publicly-available-hacking-tools Published: 2019 01 14 14:47:28 Received: 2024 03 06 17:21:35 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: NCSC advice for Marriott International customers - published almost 6 years ago. Content: httpss://www.ncsc.gov.uk/guidance/ncsc-advice-marriott-international-customers Published: 2019 01 14 12:08:52 Received: 2024 03 06 17:21:35 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
Article: One year left for Windows 7 support - published almost 6 years ago. Content: https://www.ncsc.gov.uk/blog-post/one-year-left-for-windows-7-support Published: 2019 01 12 00:00:00 Received: 2021 04 18 14:04:46 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: Kubernetes: Kubelet API containerLogs endpoint - published almost 6 years ago. Content: How to get the info that kube-hunter reports for open /containerLogs endpoint Vulnerabilities +---------------+-------------+------------------+----------------------+----------------+ | LOCATION CATEGORY | VULNERABILITY | DESCRIPTION | EVIDENCE | +---------------+-------------+------------------+----------------------+-------... https://blog.carnal0wnage.com/2019/01/kubernetes-kubelet-api-containerlogs.html Published: 2019 01 11 14:00:00 Received: 2024 02 19 11:44:47 Feed: Carnal0wnage and Attack Research Blog Source: Carnal0wnage and Attack Research Blog Category: News Topic: Hacking |
Article: Kubernetes: Kubernetes Dashboard - published almost 6 years ago. Content: Tesla was famously hacked for leaving this open and it's pretty rare to find it exposed externally now but useful to know what it is and what you can do with it. Usually found on port 30000 kube-hunter finding for it: Vulnerabilities +-----------------------+---------------+----------------------+----------------------+------------------+ | LOCATION ... https://blog.carnal0wnage.com/2019/01/kubernetes-kubernetes-dashboard.html Published: 2019 01 11 14:00:00 Received: 2024 02 19 11:44:46 Feed: Carnal0wnage and Attack Research Blog Source: Carnal0wnage and Attack Research Blog Category: News Topic: Hacking |
|
Article: Kubernetes: Kubelet API containerLogs endpoint - published almost 6 years ago. Content: How to get the info that kube-hunter reports for open /containerLogs endpoint Vulnerabilities +---------------+-------------+------------------+----------------------+----------------+ | LOCATION CATEGORY | VULNERABILITY | DESCRIPTION | EVIDENCE | +---------------+-------------+------------------+----------------------+-------... https://blog.carnal0wnage.com/2019/01/kubernetes-kubelet-api-containerlogs.html Published: 2019 01 11 14:00:00 Received: 2023 03 31 08:24:33 Feed: Carnal0wnage and Attack Research Blog Source: Carnal0wnage and Attack Research Blog Category: News Topic: Hacking |
|
Article: Kubernetes: Kubernetes Dashboard - published almost 6 years ago. Content: Tesla was famously hacked for leaving this open and it's pretty rare to find it exposed externally now but useful to know what it is and what you can do with it. Usually found on port 30000 kube-hunter finding for it: Vulnerabilities +-----------------------+---------------+----------------------+----------------------+------------------+ | LOCATION ... https://blog.carnal0wnage.com/2019/01/kubernetes-kubernetes-dashboard.html Published: 2019 01 11 14:00:00 Received: 2023 03 31 08:24:33 Feed: Carnal0wnage and Attack Research Blog Source: Carnal0wnage and Attack Research Blog Category: News Topic: Hacking |
Article: Kubernetes: Kubelet API containerLogs endpoint - published almost 6 years ago. Content: How to get the info that kube-hunter reports for open /containerLogs endpointVulnerabilities+---------------+-------------+------------------+----------------------+----------------+| LOCATION CATEGORY | VULNERABILITY | DESCRIPTION | EVIDENCE |+---------------+-------------+------------------+----------------------+---------------... https://blog.carnal0wnage.com/2019/01/kubernetes-kubelet-api-containerlogs.html Published: 2019 01 11 14:00:00 Received: 2021 06 06 09:05:30 Feed: Carnal0wnage and Attack Research Blog Source: Carnal0wnage and Attack Research Blog Category: News Topic: Hacking |
|
Article: Kubernetes: Kubernetes Dashboard - published almost 6 years ago. Content: Tesla was famously hacked for leaving this open and it's pretty rare to find it exposed externally now but useful to know what it is and what you can do with it.Usually found on port 30000kube-hunter finding for it:Vulnerabilities+-----------------------+---------------+----------------------+----------------------+------------------+| LOCATION ... https://blog.carnal0wnage.com/2019/01/kubernetes-kubernetes-dashboard.html Published: 2019 01 11 14:00:00 Received: 2021 06 06 09:05:30 Feed: Carnal0wnage and Attack Research Blog Source: Carnal0wnage and Attack Research Blog Category: News Topic: Hacking |
|
Article: Weekly Threat Report 11th January 2019 - published almost 6 years ago. Content: https://www.ncsc.gov.uk/report/weekly-threat-report-11th-january-2019 Published: 2019 01 11 00:00:00 Received: 2021 04 18 14:04:46 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
Article: CyberFirst Girls Competition 2019 - a chance to shine - published almost 6 years ago. Content: https://www.ncsc.gov.uk/blog-post/cyberfirst-girls-competition-2019-chance-shine Published: 2019 01 10 00:00:00 Received: 2021 04 18 14:04:46 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: Stepping up to multi-factor authentication - published almost 6 years ago. Content: https://www.ncsc.gov.uk/blog-post/stepping-multi-factor-authentication Published: 2019 01 09 10:14:26 Received: 2024 05 09 14:03:58 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: Weekly Threat Report 14th December 2018 - published almost 6 years ago. Content: https://www.ncsc.gov.uk/report/weekly-threat-report-14th-december-2018-0 Published: 2019 01 09 00:00:00 Received: 2021 04 18 14:04:46 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: Weekly Threat Report 30th November 2018 - published almost 6 years ago. Content: https://www.ncsc.gov.uk/report/weekly-threat-report-30th-november-2018 Published: 2019 01 09 00:00:00 Received: 2021 04 18 14:04:46 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
Article: Weekly Threat Report 14th December 2018 - published almost 6 years ago. Content: https://www.ncsc.gov.uk/report/weekly-threat-report-14th-december-2018-0 Published: 2019 01 09 00:00:00 Received: 2021 04 18 14:04:42 Feed: NCSC – Report Feed Source: National Cyber Security Centre (NCSC) Category: Reports Topic: Cyber Security |
|
Article: Weekly Threat Report 30th November 2018 - published almost 6 years ago. Content: https://www.ncsc.gov.uk/report/weekly-threat-report-30th-november-2018 Published: 2019 01 09 00:00:00 Received: 2021 04 18 14:04:42 Feed: NCSC – Report Feed Source: National Cyber Security Centre (NCSC) Category: Reports Topic: Cyber Security |
|
Article: Kubernetes: Master Post - published almost 6 years ago. Content: I have a few Kubernetes posts queued up and will make this the master post to index and give references for the topic. If i'm missing blog posts or useful resources ping me here or twitter. Talks you should watch if you are interested in Kubernetes: Hacking and Hardening Kubernetes Clusters by Example [I] - Brad Geesaman https://www.youtube.com/watch?v=v... https://blog.carnal0wnage.com/2019/01/kubernetes-master-post.html Published: 2019 01 07 14:00:00 Received: 2023 03 31 08:24:33 Feed: Carnal0wnage and Attack Research Blog Source: Carnal0wnage and Attack Research Blog Category: News Topic: Hacking |
Article: Improving government, one bit at a time - published almost 6 years ago. Content: https://www.ncsc.gov.uk/blog-post/improving-government-one-bit-time Published: 2019 01 07 03:05:14 Received: 2024 02 27 09:03:29 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: Cyber security for major events - published almost 6 years ago. Content: https://www.ncsc.gov.uk/guidance/cyber-security-for-major-events Published: 2019 01 07 00:00:00 Received: 2021 04 18 14:04:46 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
Article: Kubernetes: open etcd - published almost 6 years ago. Content: Quick post on Kubernetes and open etcd (port 2379) "etcd is a distributed key-value store. In fact, etcd is the primary datastore of Kubernetes; storing and replicating all Kubernetes cluster state. As a critical component of a Kubernetes cluster having a reliable automated approach to its configuration and management is imperative." -from: https://coreos.... https://blog.carnal0wnage.com/2019/01/kubernetes-open-etcd.html Published: 2019 01 06 14:00:00 Received: 2024 02 19 11:44:47 Feed: Carnal0wnage and Attack Research Blog Source: Carnal0wnage and Attack Research Blog Category: News Topic: Hacking |
|
Article: Kubernetes: cAdvisor - published almost 6 years ago. Content: "cAdvisor (Container Advisor) provides container users an understanding of the resource usage and performance characteristics of their running containers. It is a running daemon that collects, aggregates, processes, and exports information about running containers." runs on port 4194 Links: https://kubernetes.io/docs/tasks/debug-application-cluster/resourc... https://blog.carnal0wnage.com/2019/01/kubernetes-cadvisor.html Published: 2019 01 06 14:00:00 Received: 2024 02 19 11:44:47 Feed: Carnal0wnage and Attack Research Blog Source: Carnal0wnage and Attack Research Blog Category: News Topic: Hacking |
Article: Kubernetes: open etcd - published almost 6 years ago. Content: Quick post on Kubernetes and open etcd (port 2379) "etcd is a distributed key-value store. In fact, etcd is the primary datastore of Kubernetes; storing and replicating all Kubernetes cluster state. As a critical component of a Kubernetes cluster having a reliable automated approach to its configuration and management is imperative." -from: https://coreos.... https://blog.carnal0wnage.com/2019/01/kubernetes-open-etcd.html Published: 2019 01 06 14:00:00 Received: 2023 03 31 08:24:33 Feed: Carnal0wnage and Attack Research Blog Source: Carnal0wnage and Attack Research Blog Category: News Topic: Hacking |
|
Article: Kubernetes: cAdvisor - published almost 6 years ago. Content: "cAdvisor (Container Advisor) provides container users an understanding of the resource usage and performance characteristics of their running containers. It is a running daemon that collects, aggregates, processes, and exports information about running containers." runs on port 4194 Links: https://kubernetes.io/docs/tasks/debug-application-cluster/resourc... https://blog.carnal0wnage.com/2019/01/kubernetes-cadvisor.html Published: 2019 01 06 14:00:00 Received: 2023 03 31 08:24:33 Feed: Carnal0wnage and Attack Research Blog Source: Carnal0wnage and Attack Research Blog Category: News Topic: Hacking |
|
Article: Kubernetes: open etcd - published almost 6 years ago. Content: Quick post on Kubernetes and open etcd (port 2379)"etcd is a distributed key-value store. In fact, etcd is the primary datastore of Kubernetes; storing and replicating all Kubernetes cluster state. As a critical component of a Kubernetes cluster having a reliable automated approach to its configuration and management is imperative."-from: https://coreos.com/... https://blog.carnal0wnage.com/2019/01/kubernetes-open-etcd.html Published: 2019 01 06 14:00:00 Received: 2021 06 06 09:05:30 Feed: Carnal0wnage and Attack Research Blog Source: Carnal0wnage and Attack Research Blog Category: News Topic: Hacking |
Article: Kubernetes: cAdvisor - published almost 6 years ago. Content: "cAdvisor (Container Advisor) provides container users an understanding of the resource usage and performance characteristics of their running containers. It is a running daemon that collects, aggregates, processes, and exports information about running containers."runs on port 4194Links:https://kubernetes.io/docs/tasks/debug-application-cluster/resource-usa... https://blog.carnal0wnage.com/2019/01/kubernetes-cadvisor.html Published: 2019 01 06 14:00:00 Received: 2021 06 06 09:05:30 Feed: Carnal0wnage and Attack Research Blog Source: Carnal0wnage and Attack Research Blog Category: News Topic: Hacking |
|
Article: Phishing attacks: defending your organisation - published almost 6 years ago. Content: https://www.ncsc.gov.uk/guidance/phishing Published: 2019 01 05 00:00:00 Received: 2023 07 14 10:20:14 Feed: NCSC – Guidance Feed Source: National Cyber Security Centre (NCSC) Category: Guidance Topic: Cyber Security |
|
Article: Election guidance for local authorities - published almost 6 years ago. Content: https://www.ncsc.gov.uk/guidance/election-guidance-for-local-authorities Published: 2019 01 05 00:00:00 Received: 2022 11 14 15:20:10 Feed: NCSC – Guidance Feed Source: National Cyber Security Centre (NCSC) Category: Guidance Topic: Cyber Security |
Article: Cyber security for major events - published almost 6 years ago. Content: https://www.ncsc.gov.uk/guidance/cyber-security-for-major-events Published: 2019 01 05 00:00:00 Received: 2022 07 14 16:01:47 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: Stepping up to multi-factor authentication - published almost 6 years ago. Content: httpss://www.ncsc.gov.uk/blog-post/stepping-multi-factor-authentication Published: 2019 01 04 13:14:26 Received: 2024 03 06 17:21:35 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: NCSC vulnerability disclosure co-ordination - published almost 6 years ago. Content: https://www.ncsc.gov.uk/blog-post/ncsc-vulnerability-disclosure-co-ordination Published: 2019 01 04 12:14:34 Received: 2024 06 11 09:42:48 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
Article: Security breaches as communication: what are your users telling you? - published almost 6 years ago. Content: httpss://www.ncsc.gov.uk/blog-post/security-breaches-communication-what-are-your-users-telling-you Published: 2019 01 04 12:11:42 Received: 2024 03 06 17:21:36 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Click to Open Code Editor