diff --git a/README.md b/README.md index 19efd45..2de7973 100644 --- a/README.md +++ b/README.md @@ -8,7 +8,7 @@ This is a simple penetration testing tool which takes advantage of public cloud It reads kubelet credentials from the cloud provider metadata and configures a kubeconfig file that you can use with `kubectl` to access the API. -There's more info in our blog post at [https://www.4armed.com/blog/hacking-google-kubernetes-engine-part1/](https://www.4armed.com/blog/hacking-google-kubernetes-engine-part1/). +There's more info in our blog post at [https://www.4armed.com/blog/hacking-kubelet-on-gke/](https://www.4armed.com/blog/hacking-kubelet-on-gke/). ## Supported providers