YoVDO

An Attacker Looks at Docker - Approaching Multi-Container Applications

Offered By: Black Hat via YouTube

Tags

Black Hat Courses Docker Courses Penetration Testing Courses Containerization Courses

Course Description

Overview

Explore containerization and its impact on offensive operations in this 39-minute Black Hat conference talk aimed at experienced penetration testers. Gain insights into Docker, vulnerability lifecycles, and application security testing while learning how containerization affects exploitation and post-exploitation techniques. Discover practical implications through a demonstration and understand how to approach multi-container applications from an attacker's perspective.

Syllabus

Introduction
Penetration Testing
Purpose
Prior Art
What is Docker
Vulnerability lifecycle
How do you keep up
Development abstraction
Containerization
Hello World vs Docker
How Docker works
Control over execution
Containerization for attackers
Application security testing
Exploitation
Target Attack
Implications
Demo
Conclusions
Contact information


Taught by

Black Hat

Related Courses

Fundamentals of Containers, Kubernetes, and Red Hat OpenShift
Red Hat via edX
Configuration Management for Containerized Delivery
Microsoft via edX
Getting Started with Google Kubernetes Engine - Español
Google Cloud via Coursera
Getting Started with Google Kubernetes Engine - 日本語版
Google Cloud via Coursera
Architecting with Google Kubernetes Engine: Foundations en Español
Google Cloud via Coursera