YoVDO

Bypassing Falco - How to Compromise a Cluster without Tripping the SOC

Offered By: CNCF [Cloud Native Computing Foundation] via YouTube

Tags

Kubernetes Security Courses Penetration Testing Courses Privilege Escalation Courses Lateral Movement Courses Security Operations Courses Container Security Courses Runtime Security Courses Cloud-Native Security Courses Falco Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore advanced techniques for bypassing Falco, a popular runtime security tool for Kubernetes, in this 34-minute conference talk by Shay Berkovich from BlackBerry. Discover nine different classes of bypasses, including seven novel methods, that allow for stealthy target enumeration, privilege escalation, and lateral movement within a cluster. Learn how to leverage a specially designed container image and code snippets to automate these bypasses. Witness a practical demonstration of applying these techniques to compromise a secure Kubernetes cluster without alerting security operations. Gain valuable insights into the limitations of current security tools and understand the evolving landscape of Kubernetes security challenges.

Syllabus

Bypassing Falco: How to Compromise a Cluster without Tripping the SOC - Shay Berkovich, BlackBerry


Taught by

CNCF [Cloud Native Computing Foundation]

Related Courses

Network Security
Georgia Institute of Technology via Udacity
Proactive Computer Security
University of Colorado System via Coursera
Identifying, Monitoring, and Analyzing Risk and Incident Response and Recovery
(ISC)² via Coursera
Hacker101
HackerOne via Independent
CNIT 127: Exploit Development
CNIT - City College of San Francisco via Independent