A Detailed Talk about K8S Cluster Security from the Perspective of Attackers (Part 2)
IntroductionThe attacker's perspective on K8S cluster security (Part 1) summarizes the attack methods on K8S components, node external services, business pods, and container escape methods in the K8S cluster, corresponding to attack points. This article will continue to introduce attack points ..
A Talk About Java Serialization and Deserialization
PrefaceThe current popularity of Java security can be said to be a must-know for the red team. I once fell into the beginning of learning Java security - learning CC chain - giving up - starting to learn Java again The vicious circle of safety is like memorizing words and always stops at abandon. Fi..