YoVDO

Lack of Self Isolation - Inside a Container Exploit

Offered By: Docker via YouTube

Tags

DockerCon Courses ARP Spoofing Courses Container Security Courses Responsible Disclosure Courses

Course Description

Overview

Explore the vulnerabilities in container isolation and their potential for exploitation in this 25-minute Docker conference talk. Delve into the ways containers can influence or exploit each other, despite their intended purpose of application isolation. Learn about the underlying causes of these security issues and discover potential solutions. Join speakers Justin Cormack from Docker and Liz Rice from Aqua Security as they discuss topics including network sockets, ARP spoofing, and ping sockets. Gain insights into responsible disclosure practices, understand why certain capabilities are granted by default, and examine practical demonstrations of container security weaknesses.

Syllabus

Introduction
Responsible Disclosure
Overview
Capabilities
Network Socket
ARP spoofing
Demo
Utility Cord Catch
Why is it granted by default
Ping sockets
Solution


Taught by

Docker

Related Courses

Your IPv6 Default Config Meets FOCA - And Starts to Cry
WEareTROOPERS via YouTube
Exploiting the Netlogon Protocol
Hack In The Box Security Conference via YouTube
Wireshark Network Analysis - Network Management Tools
Write your own Operating System via YouTube
Preventing Credential Theft Lateral Movement After Initial Compromise
YouTube
ARP Spoofing and Poisoning: Understanding Man-in-the-Middle Attacks - Demo
Satish C J via YouTube