YoVDO

Hacking Containers, Kubernetes and Clouds

Offered By: media.ccc.de via YouTube

Tags

Conference Talks Courses REST APIs Courses Cloud Infrastructure Courses Kubernetes Security Courses

Course Description

Overview

Explore the vulnerabilities in container security, Kubernetes clusters, and cloud environments in this 26-minute conference talk. Discover how tokens, often carelessly left exposed, can be exploited to gain unauthorized access to powerful systems. Follow along as the speaker demonstrates a real-world attack on an OpenShift cluster that meets NIST and CIS security standards. Learn how hijacking a single container can lead to full cluster control, host access, and even compromise cloud resources. Gain insights into the far-reaching consequences of token mismanagement in cloud environments, including the potential to manipulate virtual machines, storage, and derived accounts. Access additional open-source training materials on Kubernetes security to further enhance your understanding of these critical issues.

Syllabus

Hacking Containers, Kubernetes and Clouds


Taught by

media.ccc.de

Related Courses

Architecting Microsoft Azure Solutions
Microsoft via edX
Designing Highly Scalable Web Apps on Google Cloud Platform
Google via Coursera
Windows Server 2016: Azure for On-Premises Administrators
Microsoft via edX
Essential Google Cloud Infrastructure: Foundation
Google Cloud via Coursera
Unlock Your Digital Business with SAP HANA Enterprise Cloud
SAP Learning