YoVDO

A Compendium of Container Escapes

Offered By: Black Hat via YouTube

Tags

Black Hat Courses Docker Courses Container Security Courses

Course Description

Overview

Explore a comprehensive overview of container escape techniques in this 43-minute Black Hat conference talk. Gain insights into the fundamentals of containerization and delve into a wide range of escape methods, including exposed orchestrators, Docker socket access, and vulnerable mount points. Learn about advanced techniques involving /proc manipulation and kernel structure exploitation. Broaden your understanding of container security vulnerabilities and potential attack vectors to enhance your cybersecurity knowledge.

Syllabus

A Compendium of Container Escapes


Taught by

Black Hat

Related Courses

Attack on Titan M, Reloaded - Vulnerability Research on a Modern Security Chip
Black Hat via YouTube
Attacks From a New Front Door in 4G & 5G Mobile Networks
Black Hat via YouTube
AAD Joined Machines - The New Lateral Movement
Black Hat via YouTube
Better Privacy Through Offense - How to Build a Privacy Red Team
Black Hat via YouTube
Whip the Whisperer - Simulating Side Channel Leakage
Black Hat via YouTube