YoVDO

K8s Post-Exploitation: Privilege Escalation, Sidecar Container Injection, and Runtime Security

Offered By: CNCF [Cloud Native Computing Foundation] via YouTube

Tags

Kubernetes Courses Cybersecurity Courses Cloud Security Courses Privilege Escalation Courses Malware Detection Courses Post Exploitation Courses Container Security Courses Runtime Security Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore post-exploitation scenarios in Kubernetes through this informative conference talk. Discover how attackers can remain undetected after compromising a K8s cluster, starting from a compromised pod and progressing through various privilege escalation methods. Learn about the innovative sidecar container injection technique, which allows attackers to inject malware or deploy new containers while maintaining stealth. Gain insights into leveraging audit logs, indicators of compromise, and security features to detect these scenarios, and understand how to utilize runtime security tools to deploy rules for attack detection. Enhance your understanding of Kubernetes security and post-exploitation techniques in this 33-minute presentation by Magno Logan from GoHacking, delivered at a CNCF event.

Syllabus

K8s Post-Exploitation: Privilege Escalation, Sidecar Container Injection, and Runtime... Magno Logan


Taught by

CNCF [Cloud Native Computing Foundation]

Related Courses

Penetration Testing - Post Exploitation
New York University (NYU) via edX
Metasploit Framework: Penetration Testing with Metasploit
Udemy
Metasploit
Cybrary
Armitage and Metasploit for Penetration Testing - From Information Collecting to Post Exploitation
CAE in Cybersecurity Community via YouTube
Advanced Phishing Tactics Beyond User Awareness
YouTube