►
From YouTube: Fields Tested 8/19/21
Description
No description was provided for this meeting.
If this is YOUR meeting, an easy way to fix this is to add a description to your video, wherever mtngs.io found it (probably YouTube).
A
A
A
A
A
A
A
Hello
and
welcome
everyone
looks
like
we've
got
one
viewer
so
far.
Hopefully
more
people
will
join
if
you
are
watching
this.
For
the
first
time,
welcome
to
the
cncf
twitch
channel
be
sure
to
follow
in
order
to
comment
in
the
chat
it
takes
a
few
minutes
once
you
do
that,
so
definitely
go
ahead,
so
you
can
chat
with
us.
We
definitely
want
to
chat
today
and
a
few
housekeeping
items
before
we
get
started
today.
A
Welcome
to
fields
tested.
This
is
an
official
live
stream
of
the
cncf
and,
as
such
is
subject
to
the
cncf
code
of
conduct.
Please
do
not
add
anything
to
the
chat
or
questions
that
would
be
in
violation
of
that
code
of
conduct.
Basically,
please
be
respectful
of
all
your
fellow
participants
and
presenters
and
I'm
not
sure
what
else
we
have
coming
up
this
week
on
cloudnative.tv.
A
A
C
Hi
hello,
my
name
is
brad
geesman
and
I'm
happy
to
be
here
with
my
wonderful
co-presenters.
B
Yeah,
I'm
I'm
happy
to
be
here
brad
and
I,
along
with
the
wonderful
jimmy
mesta
and
peter
benjamin,
wrote
this
workshop
and
presented
it
at
kubecon
in
san
diego,
and
so
today
we're
going
to
be
here
we're
going
to
hang
out
with
caslin.
We
are
going
to
we're
going
to
encourage
her.
If
the
thing
breaks,
the
three
of
us
will
be
able
to
work
together
to
to
get
it
running
again
and
in
just
in
total.
I'm
sure
we're
gonna
have
a
honking
good
time.
A
And
today
I'm
gonna
be
doing
my
very
first
capture
the
flag
and
let's
go
ahead,
and
I
guess
I'll
share
my
screen
so
that
people
can
get
a
sense
for
what
we're
doing.
If
you
want
to
follow
along
and
try
it
yourself,
you'll
want
to
go
to
secure
kubernetes.com
and
it
was
originally
designed
for
use
with
gke.
But
what
do
we
think
about
using
it
with
not
ga,
do
you
think
that's
possible.
B
I
did
a
lot
of
development
work
on
a
local
kind.
Cluster.
The
automation
will
definitely
not
work
with
anything
other
than
gke
and
certain
challenges.
This
setup
is
like
done
using
some
shell
script,
magic
that
I
believe,
assumes
gke,
but
the
majority
of
the
content
is
in
a
couple
of
games
and
if
you
make
like
a
kind
cluster
or
a
mini
coop
cluster
or
whatever
you
like
and
and
and
cram
them
in
there,
then
you
can.
You
can
definitely
go
ahead
and
solve
them.
That's
what
I
was
doing
for
testing
any.
B
C
I
was
gonna
say
I
think
we
picked
gke
for
specifically
for
cloud
shell
during
the
workshop
to
sort
of
make
our
lives
a
little
bit
easier,
but
the
challenges
were
not
designed
to
be
in
any
way
specific
to
gke.
There
was
a
little
bit
of
helpers
here
and
there,
like
you,
said
tammy
for
the
automation,
but
nothing,
nothing
specific
to
gke
in
terms
of
flags
and
challenges
and
solutions.
A
B
B
C
B
B
So
so
in
like
information
security
capture,
the
flag,
you
have
some
sort
of
game
where
you're
going
to
hack
things
in
order
to
typically
reveal
some
secret
information.
That
proves
that
you
hacked
the
thing
and
then,
if
it's
something
that
is
scored,
then
you
know
you
take
the
secret
information
that
you
have
revealed
and
you
insert
it
into
some
score
keeping
system
so
that
you
get
get
credit
for
what
you've
done,
and
you
know
whoever
hacks
the
most
things
the
fastest
wins,
but
not
you
know
not
it
doesn't.
B
It
doesn't
have
to
be
a
team-based
contest
to
see
who
can
get
the
most
flags
as
fast
as
you
want.
So
so
I
guess
I
would
call
this
like.
Like
a
ctf
style
workshop,
you
know
we
we
aren't
competing
with
each
other.
Also,
the
solutions
are
here
in
the
website.
So
so
you
don't
actually
have
to
determine
all
of
the
solutions
yourself.
B
You
could
close
your
eyes
and
copy
paste
your
way
through
this
and
say
I
won,
but
if
you,
if
you
take
the
time
to
think
about
what
you're
doing
and
to
to
understand
it,
then
you'll
have
a
good
time
and
learn
something
if
you
want
to
not
be
spoiled,
it's
certainly
possible
to
click
through
to
each
scenario
and
read
the
setup
and
the
description
and
then
try
it
before
scrolling
down
unspoiled
and
go
back
to
the
directions,
if
you,
if
you,
if
you
get
stuck
or
or
need
to
move
on
faster
but
yeah,
we're
we're
essentially
going
to
run
across
the
open
field
of
this
kubernetes
cluster
in
order
to
get
the
flags
which
are
you.
A
B
C
Very
exciting,
very
exciting
that
I
think
we
do
in
in.
What's
in
the
scenario
one
attack
correct,
tabby.
I
think.
B
C
That's
very
exciting,
like
in
in
four
to
five
minutes
of
setup
script.
Assuming
you
have
a
working,
you
know
g
cloud
or
a
google
account.
You
know
in
four
to
five
minutes.
You
could
be
potentially
you
know
escaping
your
first
container.
So
I'm
that's.
I
think
that's
one
of
the
the
best
things
about
designing
this
or
building
this
with
you
and
peter
and
jimmy
was.
Was
we
wanted
that
goal
to
be
very
quick
and
early?
We
didn't
want
it
to
be.
C
B
It
was
a
lot
of
fun
to
help
people
get
through
and
honestly,
it
has
been
a
total
joy
for
the
like
year
and
a
half
or
so
that
has
passed
gosh
almost
two
years
now,
since
we
gave
it
live
to
hear
from
people
who
have
who
have
gone
through
it
on
their
own
or
like
hear
from
people
that
they
have
added
it
to
the
onboarding
documentation
for
like
for
their
security
teams
at
work
or
for
their
for
their
ops
teams
at
work
like
it
just
oh,
my
gosh,
it's
so
wonderful.
B
Yeah,
I've
heard
it
from
from
several
different
people
like
at
different
companies
on
different
teams
that,
like
they,
have
taken
this
and
and
put
it
in
their
in
their
onboarding
procedure
like
go
and
go
and
work
your
way
through.
This
you'll
learn
a
lot
and,
like
people
are
doing
that.
Oh
my
gosh,
I
feel
like
I
did
something
good.
A
B
B
Kind
of
format
is
a
real,
is
a
real
joy
to
me
it.
It
reminds
me
of
of
rendon
airing
in
cycling,
which
is
this
like
very
long
distance.
Unsupported
kind
of
like,
like
the
like,
the
the
big,
the
big
worldwide
event,
is
a
non-stop
bike
race
from
paris
to
breston
back
to
paris,
it's
1200
kilometers
and
you
know
at
one
point.
B
These
were
like
in
the
early
early
1900s
like
these
were
officially
races
and
there
was
like
some
kind
of
turf
battle
between
the
sanctioning
bodies
that
was
solved
by
the
ones
who
were
running
the
the
brave
saying,
yeah.
Well,
our
events
are
officially
not
races,
and
so
since
then,
there's
like
a
success
time
and
if
you
finish
the
course
in
less
than
the
success
time,
then
then
you
succeeded
and
if
you
don't,
then
then
you
train
and
you
know,
use
better
strategy
and
whatever
and
try
to
get
better.
B
A
A
I
don't
know
if
you'll
be
able
to
follow
along,
as
I
actually
do
the
pieces,
but
if
you
want
to
you
can
go
to
secure
kubernetes.com
all
of
the
information
about
how
to
set
up
the
cluster
for
this
capture.
The
flag
game
is
there
and
it
walks
you
through
what
you
need
to
do.
The
automation,
like
we
said,
is
for
google
cloud
for
using
gke,
but
the
components
aren't
gke
specific.
A
So
if
you
wanted
to
get
it
working
on
something
else,
you
probably
couldn't
do
it
and
follow
along,
but
you
could
probably
do
it
and
then
maybe
watch
the
recording
of
this
later.
If
you
wanted
to
so
a
little
bit
about
you
all
on
this
page
so
exciting,
like
I
said
I
I
heard
about
this
first
at
cubecon
2019,
but
I
was
volunteering
at
the
conference
conference.
We're
all
ready.
A
A
fun
conference,
but
I
was
volunteering
and
I
didn't
get
to
go
so
I
asked
about
this
later
and
I
think
ian
sent
me
the
link
and
I
was
like
nice,
I'm
totally
gonna
do
this
later,
didn't.
A
So
here
we
are
in
2021,
almost
at
cubecon,
north
america,
2021
and
I'm
gonna
do
it.
So
we
can
see
in
the
getting
started
section.
The
first
thing
here
I
didn't
actually
try
clicking
this.
A
I'm
wondering
what
it'll
do,
because
I
already
have
it
set
up
over
here.
So
I
have
my
own
google
cloud
account
and
I
just
ran
the
script.
I
actually
I
had
a
project
with
a
kubernetes
cluster,
but
the
script
that
you
all
have
here
creates
your
project
in
google
cloud.
It
creates
the
the
cluster,
so
you
can
just
delete
the
project
when
you're
done
and
the
cleanup
will
be
super
easy.
A
A
B
Yeah,
like
long
ago,
there
was
a
there
was
a
semi-hard-coded
project
name
and
then
that
became
a
problem
when
we
were
iterating
on
the
setup
script,
because
projects
don't
just
age
out
right
away,
they
take
quite
some
time
to
go
away
and
so
yeah
now
there's
some
low
quality
entropy
in
there
and
all
sorts
of
all
sorts
of
good
stuff.
Yeah.
A
You
can
see
my
lovely
auto-generated
project
name
here
is
sk8
caslin
27898.
A
B
A
For
safety,
thank
you
that's
important,
so
I
have
this
up
and
I
have
lost
connection
to
my
cloud
shell,
which
I
need
to
reconnect
to.
A
Let's
go
to
the
it's
already
back
up,
but
I'm
gonna
go
ahead
and
go
to
kubernetes
engine
within
google
cloud
platform
so
that
if
we
want
to
look
at
anything
about
the
cluster
from
here,
we'll
already
be
here
and
you
can
see
this
is
the
cluster
that
was
spun
up
by
the
setup
script.
If
you
go
to
secure
kubernetes.com,
if
you're
just
joining
you'll,
be
able
to
see
what
I'm
doing
here
for
this
capture
the
flag
and
is
this
readable?
You
want
me
to
make
it
bigger.
B
A
B
A
All
right,
we
gotta
authorize
it
to
make
api
calls
and
now,
as
we're
working
with
our
our
files,
we
can
also
open
them
over
here
in
the
editor.
I
guess
if
we
want
to.
B
A
A
Yes,
cool,
so
g
cloud
container
clusters
get
credentials
with
the
name
of
the
cluster,
the
zone
that
it's
in
and
the
project
that
it's
in
which
I
didn't
need,
because
I
have
my
project
set
so
now
I
should
have
my
cube
config
set.
So
if
I
run
cube,
ctl
get
o
or
pods
dash
capital
a
for
all
namespaces.
A
Excellent
that
sounds
good
to
me.
It's
most
important
to
be
able
to
actually
see
what
we're
typing
over
here
cool,
so
we're
set
up
here.
C
B
A
A
A
I
could
look
at
the
readme,
but
I
should
probably
read
more
of
the
instructions.
First.
C
A
B
A
C
C
You're
gonna
be
playing
the
role
of
red
and
red
two
and
then
blue,
okay,
so
there's
typically
there's
well.
There
were
four
presenters
and
we
wanted
things
for
everybody
to
do,
but
we
also
wanted
it
to
be
very
specifically
mindset
driven
so
that
when
you're
red
you're
thinking
hunk
when
you're
blue
you're
thinking-
how
do
I
get
off
call
and
fix
this?
So
I
can
go
back
to
bed.
You
know.
So
there
was
a
little
bit
of
you
know:
character,
develop
very
light
character,
development
to
make
it
interesting
for
the
folks
in
the
room.
C
B
It
depends
what
you
mean
by
container
service
and
hour,
but,
like
generally,
if
you're
running
on
a
container
service
like
a
managed
container
service,
where
you
set
up
a
config-
and
you
just
say,
run
this
container
image
and
run
four
copies
of
it
or
whatever.
All
the
big
cloud
providers
have
on
generally,
if
you're
running
on
one
of
those,
they
take
great
pains
to
ensure
that
you
cannot
run
something
that
will
allow
you
to
break
out
of
that
container
and
then
harm
the
underlying
host
harm.
B
The
other
people
who
are
using
the
underlying
host
and
and
so
on
that
doesn't
mean
that
you
cannot
do
it,
but
it
certainly
means
you
can't
do
it
easily
and
also
it
means.
If
you
want
to
do
that
sort
of
thing,
then
you
need
to
look
into
are
there
you
know
is
like.
B
B
A
A
B
I
think
it's
I
I
think
bitcoin
arrow
is
at
like
approximately
three
feathers
per
farthing.
It's
gone
up
a
fair
bit
since
2019.
B
Which
is
legitimately
a
thing
that
exists
in
the
world
like
you,
don't
you
you
know
if
you
want
to
go
and
do
cyber
crime
like
just
like
everything
else,
it
is
a
business.
You
don't
do
all
the
cyber
crime
yourself,
there's
service
providers
they
compete
for
who
has
the
best
customer
service
and
and
all
sorts
of
things.
It's
it's
it's
wild
and
you
know
keep
away
from
it,
but
it
does
exist.
A
Whole
new
world
out
there,
so
I
am
playing
the
role
of
someone
who
has
an
intrusion
as
a
service
which
compromises
websites
and
uploads
a
web
shell.
A
B
Because,
as
far
as
I'm
aware,
that's
still
the
most
common
thing
that
you
know
successful
attackers
into
most
cloud
native
environments
do
because
the
you
know
the
path
to
value
is
so
short.
You
know
if
you're
going
to
break
in
steal
some
data
unless
you
actually
want
the
data.
If
what
you
want
is
money,
then
you
have
to
figure
out
the
next
step,
how
to
turn
the
data
into
money
without
getting
caught.
C
No,
this
is
just
a
little
bit
of
the
story
we
needed
to
to
give
you
a
unique
url
gotcha
that
was
to
your
cluster.
So
that's.
B
A
So
this
is
going
over
some
stuff,
we'll
probably
kind
of
talk
through
this.
That's
okay.
Instead
of
going
through
all
this
information.
A
B
Yeah
so
like
the
first
thing
that
that
you
want
to
do,
having
you
know,
having
gotten
access
to
something
is
learn
what
what
can
I
do
now
if
you
scroll
back
up
to
this
like
a
flow
chart
up
there.
So,
like
okay,
you
wanna,
you
wanna,
you
have
some
situation.
You're
gonna
study
the
situation
based
on
what
you've
learned
by
studying,
you're,
going
to
formulate
a
plan.
If
you
plan,
if
you
feel
good
enough
about
it,
you
move
on
to
attack
something.
If
you
don't
feel
good
enough
about
your
plan.
B
Maybe
you
go
back
and
study
some
more
study
plans,
study
plan.
Until
you
feel
good
about
your
plan,
then
you
go
and
attack
something
you
know,
and
by
attack
I
mean
like
take
an
action
that
is
meant
to
advance
your
goal.
You
know
that
might
mean
like
running
some
kind
of
some
kind
of
magical
command
that
exploits
a
vulnerability
in
software.
It
might
mean
sending
a
phishing
email
to
somebody.
B
You
know
this
is
something
that's
going
to
change
the
world
in
a
way
that
is,
that
is
to
your
favor
after
you've
done
that.
Well,
you
learn
more
so
either
your
attack
succeeded
or
your
attack
failed,
but
regardless
you
learn
something
from
the
outcome
of
making
that
attempt.
So
if
making
that
attempt
got
you
your
goal
well,
then
you
go
directly
to
win,
because
you
just
got
your
goal.
B
If
it
has
gotten
you
significantly
closer
to
your
goal,
then
perhaps
you
take
some
other
actions.
You
know
you
backdoor
a
a
you
know
a
cloud
iam
rule
or
you
install
password
stealing
software
on
a
server
or
something
something
to
like
help
you
to
get
back
to
that
place
without
having
to
go
through
all
the
previous
steps,
or
maybe
maybe
it
does
succeed,
but
it
doesn't
really
help
as
much
as
you
hoped
and
you're
back
to
study.
Plan
study
plan,
study
plan
attack,
something
like
okay.
You
know
this
is
this.
B
A
A
Yeah
perfect,
and
it
also
has
some
suggestions
here
in
the
study
phase.
It
looks
like
looking
at
p
networks,
I'm
not
familiar
with
a
lot
of
these
windows
and
linux
administrative
utilities.
You
name
familiar
with
that.
Netstat.
B
Yeah,
so,
like
all
you
know
right
now,
is
you
have
a
shell
on
something
provided
to
you
by
some
sketchy
contact
that
you
have,
but
you
don't
know
anything
else
about
it.
You
don't
know
what
you
can
use
it
for
you,
don't
know
you
know
where
it
is
or
if
it's
any
good,
but
you
can
run
some
some.
You
know
unix
information,
gathering,
kind
of
commands
and
see
see
what
you
can
learn
it.
B
May
it
may
suit
you
to
have
another
copy
of
this
of
this
webpage,
to
make
it
easier
to
copy
and
paste
into
your
shell.
A
All
right,
so,
let's
go
back
to
our
shell
of
something
that
our
sketchy
contact
gave
us
and,
let's
run
id.
What
kind
of
information
does
that
give
me?
There's
some
kind
of
dashboard
user
id
1000.
B
B
A
B
Like
we
can
tell
this
is
linux,
it
is
a
relatively
recent,
but
not
super
recent
kernel,
5'4.
A
C
A
And
I
know
from
the
security
session
at
the
last
cube
connie
you
that
you
did
tabitha.
A
One
thing
I
could
do
from
here
would
be
to
look
for
vulnerabilities
in
that
kernel.
If
that
would
be
useful
to
me,.
B
A
So
the
next
thing
it
recommends
running
is
cat
lsb
release
and
cat.
That's
red
hat
release,
so
these
are
some
files.
I
assume
yeah.
That
will
tell
me
some
information
about
the
operating
system
that
I'm
running
if
they
exist,
no
red
hat
release,
so
we're
not
running
a
red
hat
version
of
linux
and
we're
running
ubuntu.
It
looks
like.
C
C
B
C
C
A
B
C
B
A
B
A
B
C
Fun
fact
that
in
kubernetes
pod
specs
you
don't
necessarily
need
to
specify
a
port
in
the
pod
spec
for
it
to
be
available
to
other
pods.
So
there's
not
a
line
of
defense.
Here
of
oh,
I
only
specified
8
000
is
the
listening
container
port
of
my
pod.
Spec
3000
is
still
available
if
you
were
to
hit
it
from
another
pod.
C
B
In
this
particular
case,
in
this
particular
case,
because
we're
oh
we're
not
listening
only
on
we're
not
listening
only
on
localhost,
we
are
listening
on
the
on
the
on
the
star
interface,
so
yeah
like
within
this
cluster.
You
can
access
the
service
running
on
port
3000.
B
C
So
this
is
this-
is
this
is
a
lot
of
good
information
that
you
would
probably
potentially
automate
in
an
attacked
an
attack
scenario,
so
you
just
harvest
all
of
this
stuff
that
way
you're
not
having
to
you
know
type
it
across,
maybe
tens
or
hundreds
of
hosts
if
you're
able
to
get
that
amount
of
access.
But
this
is
sort
of
the
early
reconnaissance
footprint
fingerprinting
steps
that
we're
walking
through.
B
A
Sense
to
me,
after
watching
your
other
security
talking
queue
on
eu,
so
all
right,
then-
and
I
wanted
to
come
back
here
because
it
says
it
has
some
interesting
info
here-
that
we
kind
of
went
over
note
that
the
kernel
version
doesn't
match
up
to
the
reported
operating
system
and
there
are
very
few
processes
running
so
therefore
we
know
it's
a
container.
We
went
over
that
and
next
we
want
to
do
some
basic
checking
to
see
if
we
can
get
away
with
shenanigans.
A
B
So
time
was
unix
passwords
were
stored
in
etsy
password
p-a-s-s-w-d,
because
the
keyboards
were
bad
at
bell
labs
and
everybody
could
read
them
so
like
cat
etsy,
password.
B
B
Said
so,
like
you
can
read
this,
everybody
can
read
this
and
there
is
an
x
like
this
is
a
colon
delimited
list
of
information
and
there's
an
x
everywhere,
because
time
was
there
were
password
hashes
in
here,
because
you
can't
reverse
a
hash.
B
So
so,
when
the
user
types
in
their
password
to
log
in
then
the
system
puts
the
password
into
like
slap
chop
and
then
compares
the
resulting
dog
vomit
to
to
what's
in
etsy
password
and
if
it
matches
then
hooray.
That
was
the
right,
password
and
everything's
cool,
but
you
don't
actually
store
the
password
and
everything's
safe
right.
B
So
then
it
became
known
that
you
cannot
reverse
a
hash,
but
you
can
guess
them.
You
can
hash
every
word
in
the
dictionary
and
compare
the
result
to
what's
in
etsy,
password
and
now
like
now.
I
know
that
your
password
is
love
money,
sex,
god
or
or
whatever,
and
that's
bad
and
so
like
in
the
I
think
in
the
early
80s.
I
think
like
83
84
or
something
like
that.
I
think
it
was
like
a
unix
release.
B
6
thing
they
added
the
shadow
password
file,
which
they
moved
the
password
hashes
into
the
shadow
password
file,
which
is
only
readable
by
root
because
the
password
file
has
to
be
readable
by
everybody,
because
it's
like
how
you
translate
user
id
numbers
into
user
names,
and
things
like
that.
So,
like
everybody,
has
to
read
the
password
file,
so
they
moved
the
passwords
out
of
the
password
file
because
having
the
passwords
in
the
password
file
turned
out
to
be
a
bad
idea.
B
A
A
A
B
B
A
A
A
A
A
A
I
can't
complain
about
that
ami
container
or
container.
C
That
first
line
is
the
key
container.
Runtime
is
without.
A
A
A
B
A
So,
but
it
at
least
tells
us
that
we're
in
kubernetes,
which
is
probably
the
most
important
thing
for
us
to
know
right
now,
I
guess-
and
the
next
thing
we
want
to
do-
is
take
a
look
at
our
environment
variables
and
look
for
anything
related
to
kubernetes.
So
we've
got
a
bunch
of
stuff
here
that
looks
like
it
could
be
useful.
C
Super
definite
this
can
tell
you.
Why
would
you
do
this,
because
it's
a
quick
way
to
see
the
service
ranges
depending
on
what
things
what
services
are
defined
in
the
name
space
and
then
the
pod
ip
ranges
that
you
can
guess
based
on
the
starting
ips
of
the
what's
here.
So
you
know,
you're
in
a
private
address
space
you're,
not
a
172
you're
in
a
10
104
or
something.
A
Okay,
so
we're
in
a
kubernetes
cluster.
We
know
we're
in
a
private
address
space.
Next
thing
that
we're
going
to
try
to
do
is
to
use
these
ips.
It
looks
like
we're
going
to
run
a
curl
on
the
kubernetes
service
host
to
kubernetes
service
port,
which
is
443..
Isn't
that
just
the
api
server?
Is
that
what
we're
trying
to
contact?
Yes
cool?
A
So
we're
trying
to
learn
what
the
version
of
kubernetes
we're
running
is,
which
is
1.19
plus?
Is
that
what
what
we're
getting
here
cool,
yep.
B
A
B
That's
that's
wonderful,
the
like
in
san
diego,
it
was
hard
coded
to
1.13
because
we
didn't
dare
taunt
fate
by
having
google
like
release
a
new
gke,
stable
version,
the
day
before
the
presentation
or
anything.
But
then
a
couple
of
months
after
somebody
messaged
me
on
twitter
and
they
were
like
hey.
I
was
trying
to
run
the
thing,
but
I
can't
deploy
a
gke
cluster
on
1.13
anymore,
because
it's
too
old
now.
B
A
A
A
So
we
have
a
typical
I'm
I'm
reading
from
this
here,
not
that
I
need
to
probably
you
all
could
explain
it,
but
we
have
a
typical
kubernetes,
related
environment
variables
or
typical
kubernetes
related
environment
variables
defined,
and
we
have
anonymous
access
to
some
parts
of
the
kubernetes
api.
We
can
see
that
the
kubernetes
version
is
modern
and
supported,
but
there's
still
hope
if
the
kubernetes
security
configuration
is
sloppy.
B
A
Copied
and
pasted
sorry,
I
copied
and
pasted
from
the
tutorial,
and
it
already
did
an
export
into
our
path.
We
added
slash
temp
to
our
path.
B
B
Do
this
at
work,
yeah,
don't
do
this
at
work,
don't
do
this
on
any
like
don't
do
this,
don't
do
this
if
you
care
at
all
about
the
safety
of
the
system
you're
using
or
the
data
that
you're
processing
through
it
in
this
particular
circumstance,
we
don't
care
about
the
system
we're
using
or
the
integrity
of
the
data
that
it's
processing.
So,
therefore,
this
bad
idea
is
okay,
but
don't
do
this.
A
A
So
now,
let's
see
what
cube
ctl
can
do.
Qtl
get
all.
So
just
tell
me
everything
that
you
can
get
ctl.
We
did
due
to
client-side
throttling
not
priority
in
fairness,.
A
A
A
B
A
C
Yeah,
it
was
relatively
new,
I
want
to
say
110
111-ish
somewhere.
That's.
C
B
A
B
C
B
Opinionated
opinionated
our
back
auditing
tool
that
like
cries
for
you
when
you've
made
bad
choices
like
I
could
see
that.
A
I
like
it
now
I'm
gonna
zoom
down
here,
because
I
enjoy
this
text
right
here
happy
day.
Our
service
account
is
admin
in
our
pod's
namespace.
I
don't
know
I
I
guess
that
was
the
case.
I
mean
we
can
certainly
create
pods.
So.
B
If
you
scroll
up
you'll
see
a
lot
of
stars,
I
love.
I
love
that
I
love
that
tweet
that
ian
did
a
while
ago.
That's
like
we're
all
made
of
stars,
but
your
our
back
shouldn't
be.
B
A
A
C
B
B
A
I'm
just
going
to
go
ahead
and
run
this
and
then
I
can
go
over
it
in
a
bit.
I
don't
know
why
there's
a
sleep
there
so.
A
A
A
C
B
A
C
B
A
A
That's
good
we'll
try
to
work
that
out
folks
if
you're
listening.
I
hope
that
you
had
a
good
time
learning
about
capture
the
flags.
A
little
thing
before
we
go
remember:
kubecon
north
america.
A
Registration
is
open,
whether
you
want
to
attend
in
person
or
virtually
so
definitely
check
that
out,
don't
forget
to
like
and
subscribe
because
that's
a
thing
it.
B
A
A
B
B
Want
to
do
that
and
thank
you
all
so
much
for
joining
us.
It
has.
It
has
been
a
ton
of
fun
to
to
hack
this
cluster
and-
and
I
hope
it's
been
educational,
or
at
least
amusing.