YoVDO

Post-Exploiting a Compromised ETCD

Offered By: CNCF [Cloud Native Computing Foundation] via YouTube

Tags

Kubernetes Security Courses Container Security Courses etcd Courses Cloud-Native Security Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore advanced post-exploitation techniques for a compromised ETCD in this informative conference talk by Luis Toro Puig from NCC Group. Delve into the potential consequences of an ETCD breach, whether at the container or host level, and discover how understanding Kubernetes' data injection mechanisms into ETCD can be leveraged for malicious purposes. Learn about methods for tampering with data, injecting rogue pods, establishing persistence within a cluster, and circumventing scheduler logic and AdmissionController restrictions. Gain valuable insights into the far-reaching implications of ETCD compromise and enhance your knowledge of Kubernetes security vulnerabilities.

Syllabus

Post-Exploiting a Compromised ETCD - Luis Toro Puig, NCC Group


Taught by

CNCF [Cloud Native Computing Foundation]

Related Courses

Maintaining Deployment Security in Microsoft Azure
Pluralsight
Microsoft Azure Security Engineer: Configure Advanced Security for Compute
Pluralsight
Microsoft Azure Security Technologies (AZ-500) Cert Prep: 2 Implement Platform Protection
LinkedIn Learning
Securing Containers and Kubernetes Ecosystem
LinkedIn Learning
Performing DevSecOps Automated Security Testing
Pluralsight