YoVDO

Live Security Hack - Hack My Mis-configured Kubernetes

Offered By: Linux Foundation via YouTube

Tags

Conference Talks Courses Cybersecurity Courses DevOps Courses System Administration Courses Kubernetes Security Courses

Course Description

Overview

Explore a live security hack demonstration that exposes vulnerabilities in a misconfigured Kubernetes cluster. Witness how an attacker can escalate privileges from a vulnerable web application to gaining full control of the entire cluster. Learn about the attacker's thought process, timeline of exploitation, and critical vulnerabilities such as environment variables, service tokens, and directory traversal. Discover essential security measures including secure namespaces, readonly root file systems, and proper network configurations. Gain insights into container primitives, critical execution paths, and the importance of changing default settings. Understand the principles of confidentiality, availability, and integrity in Kubernetes security. Apply these lessons to strengthen your own cluster's defenses and prevent potential attacks.

Syllabus

Introduction
Demo Overview
Thought Process
What We Know
Timeline of Doom
Environment Variables
Network Information
Service Token
Update Timeline
Directory traversal vulnerability
Access Matrix
Secure namespace
Security boundary
Readonly root file system
Spawn root pod
Spawn nonroot container
Exploring the network
Update
Hack with new token
That was awesome
Confidentiality Availability Integrity
Container Primitives
Container Image
Critical Execution Path
Change Defaults
Be Careful With Your Code


Taught by

Linux Foundation

Tags

Related Courses

Building Geospatial Apps on Postgres, PostGIS, & Citus at Large Scale
Microsoft via YouTube
Unlocking the Power of ML for Your JavaScript Applications with TensorFlow.js
TensorFlow via YouTube
Managing the Reactive World with RxJava - Jake Wharton
ChariotSolutions via YouTube
What's New in Grails 2.0
ChariotSolutions via YouTube
Performance Analysis of Apache Spark and Presto in Cloud Environments
Databricks via YouTube