Detecting a Container Escape with Cilium and eBPF
In this article you’ll learn how an attacker with access to a Kubernetes cluster can escape from a container and:
🔹 run a pod to gain root privileges
🔹escape to the host
🔹persist the attack with invisible pods and fileless executions
👉 https://bit.ly/3BjTCL9
#security #kubernetes #ebpf #cilium
In this article you’ll learn how an attacker with access to a Kubernetes cluster can escape from a container and:
🔹 run a pod to gain root privileges
🔹escape to the host
🔹persist the attack with invisible pods and fileless executions
👉 https://bit.ly/3BjTCL9
#security #kubernetes #ebpf #cilium