An Attacker Looks at Docker - Approaching Multi-Container Applications

An Attacker Looks at Docker - Approaching Multi-Container Applications

Black Hat via YouTube Direct link

Implications

16 of 19

16 of 19

Implications

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

An Attacker Looks at Docker - Approaching Multi-Container Applications

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Introduction
  2. 2 Purpose of this talk
  3. 3 Prior Art
  4. 4 What is Docker
  5. 5 Vulnerability Lifecycle
  6. 6 Attacker vs Defender
  7. 7 Application Development
  8. 8 Containerization
  9. 9 Hello World vs Docker
  10. 10 Redis
  11. 11 Application Security Tester
  12. 12 Control Over Execution
  13. 13 Containerization for Attackers
  14. 14 Application Security Testing
  15. 15 Exploitation Expectations
  16. 16 Implications
  17. 17 Demo
  18. 18 Conclusions
  19. 19 Contact information

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.