Closed loresuso closed 7 months ago
Thanks, great question? Generally, techniques following the philosophy make sense to implement. In particular, we should try to focus on techniques that have been used in the wild, or are actively used by pentesters/red teamers.
Any thought on that for your proposed techniques?
There are a number of ways for an attacker to circumvent privileged pod detection and still harm the node. I am thinking about capabilities and namespaces, and combinations of them. For instance:
setns
to enter their namespacesI don't know how this is mapped to MITRE ATT&CK, but I just wanted to ask if it makes sense to implement these techniques