In this blog, i will show you from very basic how to use config map on kubernetes.

In reference to official documentation, config map is used to setting up configuration file data separately from application. Basically, is an API object used to stored data in key-value pair format.

For more…

This guide help penetration tester build pentesting Lab on amazon AWS, in case, you don’t have direct access to targets penetration testing vulnerable lab environment. My next topic will go through analyses different exploitation techniques utilizing Metasploit, scanning, vulnerability assessment using multiple tools withing kali.

Architecture of our lab base…

Komlan Florient dogbe

Cloud / Cybersecurity enthusiast. CehV10, RHCSA, RHCE, Comptia Sec +, ITF +, AWS Architect

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store