Attack Scenarios

Offensive security techniques for testing cloud-native defenses

Container Escape via Privileged Pod

Deploy a privileged pod, escape to the host via chroot, and detect the full attack chain with eBPF and Gatekeeper policies

Read tutorial →

Cryptominer Injection via Supply Chain

Build a trojanized container image with a hidden cryptominer, detect it with Falco and eBPF, and defend with image scanning and admission control

Read tutorial →

In-Memory Attacks on Kubernetes: Fileless Execution in Read-Only Pods

Transform ELF binaries into fileless payloads, execute them in read-only Kubernetes pods via memfd_create, and observe the full attack chain with eBPF

Read tutorial →

SSTI to RCE in Kubernetes

Exploit a Flask/Jinja2 Server-Side Template Injection to gain remote code execution inside a Kubernetes pod, then observe the attack with eBPF

Read tutorial →