YoVDO

Prepare to Be Boarded - A Tale of Kubernetes Plunder and Cryptobooty

Offered By: YouTube

Tags

DerbyCon Courses Kubernetes Courses Kubernetes Security Courses Cryptojacking Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore a conference talk that delves into Kubernetes security vulnerabilities and cryptojacking risks. Learn about the basics of Kubernetes, its potential security flaws, and how attackers can exploit open dashboards. Examine real-world examples of cryptojacking attempts, including a detailed analysis of Micro Kubernetes installations. Gain insights into detection methods through Wireshark screenshots, post requests, and metadata analysis. Understand the importance of securing Kubernetes deployments and protecting against unauthorized cryptocurrency mining operations.

Syllabus

Intro
Cryptobooty
What is Kubernetes
Childrens Guide to Kubernetes
Kubernetes Security
Open Dashboards
IP Listing
Kubernetes Dashboard
Research
Cryptojacking
Micro Kubernetes
Installing Micro Kubernetes
First impressions
Wireshark screenshot
Post Request
Kubernetes Object
XMRig
IP Address
Metadata
Commands
Pots
IP Addresses
Resources


Related Courses

Powershell and Windows Throw the Best Shell Parties
YouTube
Rawr - Rapid Assessment of Web Resources
YouTube
Metasploit Town Hall - Redubbed
YouTube
Hunting Webshells - Tracking TwoFace
YouTube
Incident Response on macOS - Thomas Reed
YouTube