Post-exploiting a compromised etcd – Full control over the cluster and its nodes