diff --git a/docs/files/hacklu24/Kubehound-HackLu2024-slides.pdf b/docs/files/hacklu24/Kubehound-HackLu2024-slides.pdf new file mode 100644 index 000000000..80a9cd124 Binary files /dev/null and b/docs/files/hacklu24/Kubehound-HackLu2024-slides.pdf differ diff --git a/docs/files/hacklu24/Kubehound-Workshop-HackLu24.pdf b/docs/files/hacklu24/Kubehound-Workshop-HackLu24.pdf new file mode 100644 index 000000000..1acfe28bb Binary files /dev/null and b/docs/files/hacklu24/Kubehound-Workshop-HackLu24.pdf differ diff --git a/docs/references.md b/docs/references.md index d6d11ab48..04c8b7319 100644 --- a/docs/references.md +++ b/docs/references.md @@ -1,5 +1,29 @@ # References +## 2024 - HackLu Workshop + +### [KubeHound: Identifying attack paths in Kubernetes clusters at scale with no hustle](https://pretalx.com/hack-lu-2024/talk/HWDZGZ/) + +[Slides :fontawesome-solid-file-pdf:{ .pdf } ](files/hacklu24/Kubehound-Workshop-HackLu24.pdf){ .md-button } [Jupyter notebook :fontawesome-brands-python:{ .python } ](https://github.com/DataDog/KubeHound/tree/main/deployments/kubehound/notebook/KubehoundDSL_101.ipynb){ .md-button } + +Updated version of the Pass The Salt Workshop. Prerequisites are listed on [kubehound.io/workshop](https://kubehound.io/workshop/). The workshop is a hands-on session where participants will learn how to use KubeHound to identify attack paths in Kubernetes clusters. The workshop will cover the following topics: + +- Hack a vulnerable Kubernetes cluster (exploiting 4 differents attacks in a local environement). +- Use KubeHound to identify specific resources in the vulnerable cluster. +- Use KubeHound to identify attack paths in the vulnerable cluster. + +## 2024 - HackLu presentation + +### [KubeHound: Identifying attack paths in Kubernetes clusters at scale with no hustle](https://pretalx.com/hack-lu-2024/talk/HWDZGZ/) + +[Recording :fontawesome-brands-youtube:{ .youtube } ](https://www.youtube.com/watch?v=h-dD7PQC4NA){ .md-button .md-button--youtube } [Slides :fontawesome-solid-file-pdf:{ .pdf } ](files/hacklu24/Kubehound-HackLu24-slides.pdf){ .md-button } + +This presentation explains the genesis behind the tool and a brief introduction to what Kubernetes security is. We showcase the three main usage for KubeHound: + +- As a standalone tool to identify attack paths in a Kubernetes cluster from a laptop (the automatic mode and easy way to dump and ingest the data). +- As a blue teamer with **KubeHound as a Service** or **KHaaS** which allow using KubeHound to be used with a distributed model across multiple Kuberentes Clusters to generate continuously a security posture on a daily basis. +- As a consultant using the asynchronously mechanism to dump and rehydrate the KubeHound state from 2 different locations. + ## 2024 - Pass The Salt (PTS) Workshop ### [KubeHound: Identifying attack paths in Kubernetes clusters at scale with no hustle](https://cfp.pass-the-salt.org/pts2024/talk/WA99YZ/) diff --git a/pyproject.toml b/pyproject.toml index 9a5bec116..c324fc998 100644 --- a/pyproject.toml +++ b/pyproject.toml @@ -7,7 +7,7 @@ readme = "README.md" [tool.poetry.dependencies] python = "^3.11" -mkdocs = "^1.2" +mkdocs = "^1.5" mkdocs-material = "^9.4.7" mkdocs-awesome-pages-plugin = "^2.9.2" markdown-captions = "^2.1.2"