Attacking Kubernetes: Offensive Recon and Attack Path Analysis with CDK, Kubehound, and KubescapePart 1 - Lab setup, attacker simulation, and finding exploitable misconfigurationsMay 14, 2026·12 min read·9