YoVDO

Bypassing Falco - How to Compromise a Cluster without Tripping the SOC

Offered By: CNCF [Cloud Native Computing Foundation] via YouTube

Tags

Kubernetes Security Courses Penetration Testing Courses Privilege Escalation Courses Lateral Movement Courses Security Operations Courses Container Security Courses Runtime Security Courses Cloud-Native Security Courses Falco Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore advanced techniques for bypassing Falco, a popular runtime security tool for Kubernetes, in this 34-minute conference talk by Shay Berkovich from BlackBerry. Discover nine different classes of bypasses, including seven novel methods, that allow for stealthy target enumeration, privilege escalation, and lateral movement within a cluster. Learn how to leverage a specially designed container image and code snippets to automate these bypasses. Witness a practical demonstration of applying these techniques to compromise a secure Kubernetes cluster without alerting security operations. Gain valuable insights into the limitations of current security tools and understand the evolving landscape of Kubernetes security challenges.

Syllabus

Bypassing Falco: How to Compromise a Cluster without Tripping the SOC - Shay Berkovich, BlackBerry


Taught by

CNCF [Cloud Native Computing Foundation]

Related Courses

Bypassing Falco - Cluster Compromise Without Tripping the SOC
secwestnet via YouTube
Introduction to Falco - Cloud-Native Runtime Security
Rawkode Academy via YouTube
Overcoming CVE Shock - Adding Perspective in Vulnerability Scanning
Devoxx via YouTube
How to Secure a Kubernetes Cluster from Scratch
Devoxx via YouTube
Tools to Help You Secure Your Kubernetes Cluster
Devoxx via YouTube