Kubernetes environments are often configured with many defaults, which can be weak and represent a vulnerability.
In the first of this series of blogs on penetration testing of Kubernetes environments, the author provides insights into how attackers can gain information about pods and clusters, the first step in identifying vulnerabilities.
Kubernetes commands such as kubectl get pods -A can retrieve information, but the author notes that the results are limited and that the tip for practitioners is that without access to a namespace, the request will fail.
The author also tuotes that there are many more options for retrieving information from a cluster, and these will be explored in a future article.
Practitioners and administrators should therefore be aware that attackers can gain information easily and look to mitigate this vulnerability in their configurations.