Bypassing Falco - How to Compromise a Cluster without Tripping the SOC
Offered By: CNCF [Cloud Native Computing Foundation] via YouTube
Course Description
Overview
Explore advanced techniques for bypassing Falco, a popular runtime security tool for Kubernetes, in this 34-minute conference talk by Shay Berkovich from BlackBerry. Discover nine different classes of bypasses, including seven novel methods, that allow for stealthy target enumeration, privilege escalation, and lateral movement within a cluster. Learn how to leverage a specially designed container image and code snippets to automate these bypasses. Witness a practical demonstration of applying these techniques to compromise a secure Kubernetes cluster without alerting security operations. Gain valuable insights into the limitations of current security tools and understand the evolving landscape of Kubernetes security challenges.
Syllabus
Bypassing Falco: How to Compromise a Cluster without Tripping the SOC - Shay Berkovich, BlackBerry
Taught by
CNCF [Cloud Native Computing Foundation]
Related Courses
Palo Alto Networks CybersecurityPalo Alto Networks via Coursera (ISC)² Systems Security Certified Practitioner (SSCP)
(ISC)² via Coursera CompTIA Security+ (SY0-701) Complete Course & Exam
Udemy SSCP®: Monitoring and Analysis & Risk, Response, and Recovery (2012 Objectives)
Pluralsight SSCP®: Security Operations and Administration
Pluralsight