YoVDO

An Attacker Looks at Docker - Approaching Multi-Container Applications

Offered By: Black Hat via YouTube

Tags

Black Hat Courses Docker Courses Penetration Testing Courses Containerization Courses

Course Description

Overview

Explore Docker containerization and its impact on offensive security operations in this 39-minute Black Hat conference talk. Gain insights into the vulnerability lifecycle, attacker vs. defender perspectives, and implications for application security testing. Learn how containerization affects exploitation expectations and discover practical applications through a demonstration. Ideal for penetration testers seeking to understand the security implications of multi-container applications.

Syllabus

Introduction
Purpose of this talk
Prior Art
What is Docker
Vulnerability Lifecycle
Attacker vs Defender
Application Development
Containerization
Hello World vs Docker
Redis
Application Security Tester
Control Over Execution
Containerization for Attackers
Application Security Testing
Exploitation Expectations
Implications
Demo
Conclusions
Contact information


Taught by

Black Hat

Related Courses

Cloud Computing Applications, Part 1: Cloud Systems and Infrastructure
University of Illinois at Urbana-Champaign via Coursera
Introduction to Cloud Infrastructure Technologies
Linux Foundation via edX
Introduction aux conteneurs
Microsoft Virtual Academy via OpenClassrooms
The Docker for DevOps course: From development to production
Udemy
Windows Server 2016: Virtualization
Microsoft via edX