Resource Center

Magnet Summit 2022

Exploitation vulnerable Gitea application through which we can gain authenticated command execution to a Kubernetes cluster

This presentation will cover the forensics artifacts that are associated with the exploitation of a Kubernetes cluster.

Holo, transparent letter M

Subscribe today to hear directly from Magnet Forensics on the latest product updates, industry trends, and company news.

Start modernizing your digital investigations today.

Top