An Attacker Looks at Docker - Approaching Multi-Container Applications

An Attacker Looks at Docker - Approaching Multi-Container Applications

Black Hat via YouTube Direct link

Containerization for attackers

13 of 20

13 of 20

Containerization for attackers

Class Central Classrooms beta

YouTube playlists curated by Class Central.

Classroom Contents

An Attacker Looks at Docker - Approaching Multi-Container Applications

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Introduction
  2. 2 Penetration Testing
  3. 3 Purpose
  4. 4 Prior Art
  5. 5 What is Docker
  6. 6 Vulnerability lifecycle
  7. 7 How do you keep up
  8. 8 Development abstraction
  9. 9 Containerization
  10. 10 Hello World vs Docker
  11. 11 How Docker works
  12. 12 Control over execution
  13. 13 Containerization for attackers
  14. 14 Application security testing
  15. 15 Exploitation
  16. 16 Target Attack
  17. 17 Implications
  18. 18 Demo
  19. 19 Conclusions
  20. 20 Contact information

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.