Detecting Crypto-Jacking in Kubernetes Workloads
Offered By: CNCF [Cloud Native Computing Foundation] via YouTube
Course Description
Overview
Explore crypto-jacking detection in Kubernetes workloads through this comprehensive 57-minute Cloud Native Live conference talk. Dive into topics such as Falco, privilege escalation, suspicious networking, and package management. Learn about plugin architecture, XMRig, and custom rule creation. Gain insights on testing Falco in Kubernetes environments, understanding hidden connections, and implementing clear guard rails. Discover the developer guide, GitHub resources, and get answers to common questions about Palco usage and Falco remediation.
Syllabus
Introduction
Overview
Falco
Psrux
Chmod
Creating a privilege part
Adding suspicious networking
Launching package management
Launching Telnet
Detecting a minor
Audience question
Plugin architecture
Plugin sources
XMRig
Building your own rules
Creating the environment
Testing Falco
Summary
Clear Guard Rail
Audience Questions
Falco Remediation
Custom Rule
Developer Guide
GitHub
Questions
Why use Palco
Hidden connections
Testing Falco in Kubernetes
Final Question
Final Words
Taught by
CNCF [Cloud Native Computing Foundation]
Related Courses
Bypassing Falco - Cluster Compromise Without Tripping the SOCsecwestnet via YouTube Introduction to Falco - Cloud-Native Runtime Security
Rawkode Academy via YouTube Overcoming CVE Shock - Adding Perspective in Vulnerability Scanning
Devoxx via YouTube How to Secure a Kubernetes Cluster from Scratch
Devoxx via YouTube Tools to Help You Secure Your Kubernetes Cluster
Devoxx via YouTube