Skip to main content

Attack techniques

Topics to cover:

  • Api key leak
  • CI/CD compromise
  • Credential harvesting
  • Docker socket abuse
  • Kubernetes lateral movement
  • Metadata service abuse
  • Serverless abuse
  • Supply chain attacks
  • Container escape
  • Data exfiltration
  • IAM privilege escalation
  • Kubernetes privilege escalation
  • Public storage exposure
  • STS token abuse