This article is based on the blog post "A Record of Cloud-Native Vulnerability Discovery and Exploitation in Red-Blue Adversarial Scenarios" originally published by neargle and pk on Tencent TSRC, and is continuously updated and improved. Due to the continuous development and changes in Kubernetes security features, container security, and other attack and defense techniques, the content of the article will be continuously adjusted. Subsequent updates will include the setup of experimental environments from scratch, Kubernetes security feature resistance, complete red-blue adversarial case studies, EBPF security, and related content.
The visualization notes are based on Heptabase implementation. Visualization notes can help to better understand and display complex information. As an initial attempt, the experience was quite good, but I did not renew it later due to pricing considerations, and switched to Obsidian.
Preview:
Online link: https://app.heptabase.com/w/60306bad93e7e1bc7482688665bc31f19d662eb6f057e33096a3a15f6dfeb582