Prepare to Be Boarded - A Tale of Kubernetes Plunder and Cryptobooty
Offered By: YouTube
Course Description
Overview
Explore a conference talk that delves into Kubernetes security vulnerabilities and cryptojacking risks. Learn about the basics of Kubernetes, its potential security flaws, and how attackers can exploit open dashboards. Examine real-world examples of cryptojacking attempts, including a detailed analysis of Micro Kubernetes installations. Gain insights into detection methods through Wireshark screenshots, post requests, and metadata analysis. Understand the importance of securing Kubernetes deployments and protecting against unauthorized cryptocurrency mining operations.
Syllabus
Intro
Cryptobooty
What is Kubernetes
Childrens Guide to Kubernetes
Kubernetes Security
Open Dashboards
IP Listing
Kubernetes Dashboard
Research
Cryptojacking
Micro Kubernetes
Installing Micro Kubernetes
First impressions
Wireshark screenshot
Post Request
Kubernetes Object
XMRig
IP Address
Metadata
Commands
Pots
IP Addresses
Resources
Related Courses
Security Best Practices in Google CloudGoogle Cloud via Coursera Architecting with Google Kubernetes Engine: Production en Français
Google Cloud via Coursera Configuring and Managing Kubernetes Security
Pluralsight Security Best Practices in Google Cloud
Pluralsight Kubernetes Security: Cluster Hardening
Pluralsight