You've hacked into a low-privileged AWS EKS pod. Use the web terminal below to find flags across the environment. Each challenge runs in a different Kubernetes namespaces with varying permissions.
All K8s resources are crucial; challenges are based on real EKS misconfigurations and security issues.
Click "Begin Challenge" on your desktop, and for guidance, click the question mark icon for useful cheat sheet.
Good luck!