Orchestrate This! Kubernetes Rootkit
Offered By: Black Hat via YouTube
Course Description
Overview
Explore the concept of a container-focused rootkit and its potential for conducting and concealing malicious activities within a Kubernetes cluster in this 14-minute Black Hat conference talk. Delve into the basic anatomy of rootkits before examining the specifics of container-based rootkits and their potential consequences. Learn strategies for mitigating risks associated with Kubernetes-based rootkit attacks, including best practices for cluster security, detection, and response to potential threats.
Syllabus
Orchestrate This! Kubernetes Rootkit
Taught by
Black Hat
Related Courses
Rootkits and Stealth Apps: Creating & Revealing 2.0 HACKINGUdemy CNIT 126: Practical Malware Analysis
CNIT - City College of San Francisco via Independent OPSEC and Personal Security Guide - Cybertalk Episode 7
HackerSploit via YouTube Demystifying Modern Windows Rootkits
Black Hat via YouTube Investigating Malware Using Memory Forensics - A Practical Approach
Black Hat via YouTube