Lenin alevski 🕵️💻<p>After my last post analyzing the NGINX <a href="https://infosec.exchange/tags/IngressNightmare" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IngressNightmare</span></a> vulnerability, I’m excited to share a new addition to my Kubernetes Security: Advanced Exploitation series!</p><p>Inspired by the excellent research from the Wiz team on CVE-2025-1974, I’ve created a hands-on lab that walks you through exploiting this issue step by step. You can try it out here:<br>🔗 <a href="https://github.com/Alevsk/dvka/tree/master/workshop/labs/ingress-nightmare" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/Alevsk/dvka/tree/ma</span><span class="invisible">ster/workshop/labs/ingress-nightmare</span></a></p><p>This lab offers a safe environment to:</p><p>1. Reproduce the vulnerability<br>2. Understand how the exploit works<br>👉 <a href="https://github.com/Alevsk/dvka/blob/master/workshop/labs/ingress-nightmare/cve-2025-1974.py" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/Alevsk/dvka/blob/ma</span><span class="invisible">ster/workshop/labs/ingress-nightmare/cve-2025-1974.py</span></a><br>3. Generate your own indicators of compromise (IOCs)</p><p>It’s a great way to deepen your Kubernetes security knowledge and gain hands-on experience with real-world exploitation techniques. Have fun learning, and feel free to share any thoughts or questions!</p>