An Attacker Looks at Docker - Approaching Multi-Container Applications

An Attacker Looks at Docker - Approaching Multi-Container Applications

Black Hat via YouTube Direct link

Control Over Execution

12 of 19

12 of 19

Control Over Execution

Class Central Classrooms beta

YouTube playlists curated by Class Central.

Classroom Contents

An Attacker Looks at Docker - Approaching Multi-Container Applications

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Introduction
  2. 2 Purpose of this talk
  3. 3 Prior Art
  4. 4 What is Docker
  5. 5 Vulnerability Lifecycle
  6. 6 Attacker vs Defender
  7. 7 Application Development
  8. 8 Containerization
  9. 9 Hello World vs Docker
  10. 10 Redis
  11. 11 Application Security Tester
  12. 12 Control Over Execution
  13. 13 Containerization for Attackers
  14. 14 Application Security Testing
  15. 15 Exploitation Expectations
  16. 16 Implications
  17. 17 Demo
  18. 18 Conclusions
  19. 19 Contact information

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.