Kubernetes’ ‘allowPrivilegeEscalation’ is a useful but poorly understood security hardening setting. Let’s dive into how it works and debunk some common myths about it.
Tag: security
[Write-up] Insomni’hack 2018 CTF teaser
[Write-up] SickOs 1.1
[Write-up] Vulnix – playing around with NFS
[Write-up] Mr Robot
[Write-up] Droopy v0.2 CTF
I recently started gaining a lot of interest in security, and after reading several CTF write-ups, I decided to try to solve one by myself. I chose Droopy v0.2. In case you don’t know, the goal of a CTF is very simple: Capture The Flag! Most of the time, the flag is simply a text file that you can obtain after having gained root access on the machine. You are only provided with a virtual machine, and the rest is up to you. Let’s get started!