Gain a Splash of New Skills - Coursera+ Annual Just ₹7,999
Get 35% Off CFI Certifications - Code CFI35
Overview
Coursera Spring Sale
40% Off Coursera Plus Annual!
Grab it
Explore a comprehensive red team attack scenario that demonstrates how Kubernetes and secrets management misconfigurations can lead to serious security exposures, while learning defensive strategies using HashiCorp Vault. Begin with external reconnaissance using Shodan to identify exposed HashiCorp services like Vault, Consul, and Nomad on the public internet, then pivot into Kubernetes clusters by exploiting common vulnerabilities including insecure dashboards, overly permissive policies, and poor token hygiene. Follow a structured attack chain that includes privilege escalation through service account tokens and Vault API misuse, secrets extraction from Vault's AWS secrets engine, and discovery of Terraform state file leaks with hardcoded tokens. Learn real-world defensive strategies implementing Vault's flexible authentication methods, short-lived credentials, namespace segmentation, and integrations with Kubernetes RBAC and network policies. Discover an automated approach for exposure monitoring using the Shodan API to proactively detect when Vault or related infrastructure becomes exposed. Gain practical insights for both offensive and defensive security teams to identify risks, simulate real-world threats, and strengthen secrets management with Vault as a core security component in modern cloud-native environments.
Syllabus
From Shodan to Secrets: Red Teaming Vault in Kubernetes—and Building Resilient Defenses with the Has
Taught by
HashiCorp