Outside the Box - Breakouts and Privilege Escalation in Container Environments
Offered By: BruCON Security Conference via YouTube
Course Description
Overview
Explore container security vulnerabilities and escape techniques in this 40-minute conference talk from BruCON Security Conference. Dive into the world of container technologies, focusing on their widespread adoption and the potential security risks they pose. Learn about real-world exploitable setups encountered by security professionals, including exposed Docker daemons, Kubernetes API access vulnerabilities in multi-tenant environments, and weak Linux capability blacklists. Discover how seemingly minor misconfigurations can lead to container escapes and privilege escalation. Gain insights into the complex interplay between container technology, Linux kernel, and other subsystems that create attack surfaces. Acquire a methodology for assessing containerized environments, witness demonstrations of attacks against common deployments, and receive configuration recommendations to enhance container security. Leave equipped with knowledge of tools to verify safe configurations and a deeper understanding of the intricate security considerations in container environments.
Syllabus
19 - BruCON 0x0A - Outside the Box Breakouts and Privilege Escalation in Container Environments-Rob
Taught by
BruCON Security Conference
Related Courses
Maintaining Deployment Security in Microsoft AzurePluralsight Microsoft Azure Security Engineer: Configure Advanced Security for Compute
Pluralsight Microsoft Azure Security Technologies (AZ-500) Cert Prep: 2 Implement Platform Protection
LinkedIn Learning Securing Containers and Kubernetes Ecosystem
LinkedIn Learning Performing DevSecOps Automated Security Testing
Pluralsight