Prepare to Be Boarded - A Tale of Kubernetes Plunder and Cryptobooty
Offered By: YouTube
Course Description
Overview
Explore a conference talk that delves into Kubernetes security vulnerabilities and cryptojacking risks. Learn about the basics of Kubernetes, its potential security flaws, and how attackers can exploit open dashboards. Examine real-world examples of cryptojacking attempts, including a detailed analysis of Micro Kubernetes installations. Gain insights into detection methods through Wireshark screenshots, post requests, and metadata analysis. Understand the importance of securing Kubernetes deployments and protecting against unauthorized cryptocurrency mining operations.
Syllabus
Intro
Cryptobooty
What is Kubernetes
Childrens Guide to Kubernetes
Kubernetes Security
Open Dashboards
IP Listing
Kubernetes Dashboard
Research
Cryptojacking
Micro Kubernetes
Installing Micro Kubernetes
First impressions
Wireshark screenshot
Post Request
Kubernetes Object
XMRig
IP Address
Metadata
Commands
Pots
IP Addresses
Resources
Related Courses
Introduction to Cloud Infrastructure TechnologiesLinux Foundation via edX Scalable Microservices with Kubernetes
Google via Udacity Google Cloud Fundamentals: Core Infrastructure
Google via Coursera Introduction to Kubernetes
Linux Foundation via edX Fundamentals of Containers, Kubernetes, and Red Hat OpenShift
Red Hat via edX