πŸ“˜
DFIR
search
⌘Ctrlk
πŸ“˜
DFIR
  • Networking
    • Networking
  • Windows
    • Administration
    • Forensics
      • System Info
      • Memory
      • Network Logs
      • File System
      • Registry
      • Network Share
      • Exfiltration
      • Evidence of Execution
      • Hacktool Artifacts
      • Event Logs
      • 3rd Party Apps
        • IIS
        • Kubernetes
        • GitHub
        • Jenkins
        • Snowflake
        • Misc
        • "TA Tools"
        • Identity Apps
        • Microsoft
        • SysInternals
        • RMM
        • Zoom
        • Browser Forensics
      • Example Page
    • Cheat Sheet
    • Investigation
    • Internals
    • Active Directory
    • MISC
  • Linux
    • Forensics
    • SSH
    • Linux WebShells
    • Directories of Interest
    • Internals
  • Enterprise Architecture
    • CI/CD Pipline
    • Citrix
    • Web Applications
    • The Cloud
    • vSphere
    • Containers
    • Troubleshooting
  • Mac
    • Forensics
  • Attacker Information
    • Adversary Operations
    • Actor Playbooks
    • Abused Domains
  • IR Playbook
    • Activity from Unmanaged Host
    • Recommendations
  • Reverse Engineering
    • Python - Pyinstaller
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. Windowschevron-right
  2. Forensicschevron-right
  3. 3rd Party Apps

Kubernetes

LogoPage not found - HackTricks Cloudcloud.hacktricks.xyzchevron-right
Logo"WireServing" Up Credentials: Escalating Privileges in Azure Kubernetes Services | Google Cloud BlogGoogle Cloud Blogchevron-right
https://diveinto.com/courses/dive-into-cloud-native-containers-kubernetes-and-the-kcna/lectures/51569583diveinto.comchevron-right

hashtag
What Is?

hashtag
Forensic Value:

hashtag
File Location:

hashtag
Parse Data:

hashtag
Considerations:

hashtag
Example:

hashtag
Analysis Tips:

hashtag
Anti-Forensics:

PreviousIISchevron-leftNextGitHubchevron-right

Last updated 1 year ago

  • What Is?
  • Forensic Value:
  • File Location:
  • Parse Data:
  • Considerations:
  • Example:
  • Analysis Tips:
  • Anti-Forensics: