An Attacker Looks at Docker - Approaching Multi-Container Applications
Offered By: Black Hat via YouTube
Course Description
Overview
Explore Docker containerization and its impact on offensive security operations in this 39-minute Black Hat conference talk. Gain insights into the vulnerability lifecycle, attacker vs. defender perspectives, and implications for application security testing. Learn how containerization affects exploitation expectations and discover practical applications through a demonstration. Ideal for penetration testers seeking to understand the security implications of multi-container applications.
Syllabus
Introduction
Purpose of this talk
Prior Art
What is Docker
Vulnerability Lifecycle
Attacker vs Defender
Application Development
Containerization
Hello World vs Docker
Redis
Application Security Tester
Control Over Execution
Containerization for Attackers
Application Security Testing
Exploitation Expectations
Implications
Demo
Conclusions
Contact information
Taught by
Black Hat
Related Courses
Cloud Computing Applications, Part 1: Cloud Systems and InfrastructureUniversity of Illinois at Urbana-Champaign via Coursera Introduction to Cloud Infrastructure Technologies
Linux Foundation via edX Introduction aux conteneurs
Microsoft Virtual Academy via OpenClassrooms The Docker for DevOps course: From development to production
Udemy Windows Server 2016: Virtualization
Microsoft via edX