DataDog / stratus-red-team

:cloud: :zap: Granular, Actionable Adversary Emulation for the Cloud
https://stratus-red-team.cloud
Apache License 2.0
1.83k stars 215 forks source link

[QUESTION] [k8s] Circumventing the privileged pod technique #430

Closed loresuso closed 7 months ago

loresuso commented 1 year ago

There are a number of ways for an attacker to circumvent privileged pod detection and still harm the node. I am thinking about capabilities and namespaces, and combinations of them. For instance:

I don't know how this is mapped to MITRE ATT&CK, but I just wanted to ask if it makes sense to implement these techniques

christophetd commented 1 year ago

Thanks, great question? Generally, techniques following the philosophy make sense to implement. In particular, we should try to focus on techniques that have been used in the wild, or are actively used by pentesters/red teamers.

Any thought on that for your proposed techniques?