Nody´s blog

Posts

Pentesting Cloud Sandboxes in the wild

Container Breakouts – Part 3: Docker Socket

Container Breakouts – Part 2: Privileged Container

Container Breakouts – Part 1: Access to root directory of the Host

Verify your Kubernetes Cluster Network Policies: From Faith to Proof

Kubernetes Basics and Principles