Kubernetes Security: Attacking and Defending K8s Clusters