Prepare to Be Boarded - A Tale of Kubernetes Plunder and Cryptobooty
Offered By: YouTube
Course Description
Overview
Explore a conference talk that delves into Kubernetes security vulnerabilities and cryptojacking risks. Learn about the basics of Kubernetes, its potential security flaws, and how attackers can exploit open dashboards. Examine real-world examples of cryptojacking attempts, including a detailed analysis of Micro Kubernetes installations. Gain insights into detection methods through Wireshark screenshots, post requests, and metadata analysis. Understand the importance of securing Kubernetes deployments and protecting against unauthorized cryptocurrency mining operations.
Syllabus
Intro
Cryptobooty
What is Kubernetes
Childrens Guide to Kubernetes
Kubernetes Security
Open Dashboards
IP Listing
Kubernetes Dashboard
Research
Cryptojacking
Micro Kubernetes
Installing Micro Kubernetes
First impressions
Wireshark screenshot
Post Request
Kubernetes Object
XMRig
IP Address
Metadata
Commands
Pots
IP Addresses
Resources
Related Courses
The Cybersecurity Threat LandscapeLinkedIn Learning The Cybersecurity Threat Landscape (2019)
LinkedIn Learning Botnets for Mining Cryptocurrencies - Renita Murimi
CAE in Cybersecurity Community via YouTube Minesweeper - An In-Depth Look into Drive-By Cryptocurrency Mining and Its Defense
Association for Computing Machinery (ACM) via YouTube TeamTNT - Explosive Cryptomining
Black Hat via YouTube