As an attacker, you are going to search for powerful accounts. However, it is difficult to know the answer to the question "what rights does this account have?" just by natively using the API. Fortunately, a useful tool has been coded by Fairwinds (written in golang so it can be downloaded as a statically compiled binary) that simplifies this process: https://github.com/FairwindsOps/rbac-lookup
Service Account Interesting "Attacker" Permissions Role/Cluster Role Binding Extract Details
kube-system:bootstrap-signer
Can get secrets in kube-system namespace
"apiGroups": [""],"resources": ["secrets"],"verbs": ["get","list","watch"
kube-system:clusterrole-aggregation-controller
Can do everything!
"apiGroups": ["*"],"resources": ["*"],"verbs": ["*"]
kube-system:daemon-set-controller
Can create pods
"apiGroups": [""],"resources": ["pods"],"verbs": ["create","delete","list","patch","watch"]