Completed
CONTAINERS EVERYWHERE
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Well, That Escalated Quickly! How Abusing Docker API Led to Remote Code Execution, Same Origin Bypass and Persistence in the Hypervisor via Shadow Containers
Automatically move to the next video in the Classroom when playback concludes
- 1 aqua Well. That Escalated Quickly!
- 2 FOCUS
- 3 MENU
- 4 VIRTUAL MACHINES VS CONTAINERS
- 5 CONTAINERS EVERYWHERE
- 6 CONTAINER ADOPTION STATS
- 7 DEVELOPERS AS TARGETS
- 8 ATTACK OVERVIEW -WINDOWS 10
- 9 DOCKER 4 WINDOWS / MAC
- 10 BROWSER SECURITY
- 11 SAME ORIGIN POLICY (SOP)
- 12 DOCKER API CALLS THAT DON'T VIOLATE SOP
- 13 BUILD IMAGE API CALL → REVERSE SHELL DEMO
- 14 ABUSE DOCKER BUILD
- 15 DOCKER FIX
- 16 WHAT'S NEXT?
- 17 LIMITATIONS
- 18 DNS REBINDING - HISTORY
- 19 DNS REBINDING - HOW IT WORKS
- 20 WHY NOT USE DNS REBINDING?
- 21 ATTACKING LLMNR
- 22 HOST REBINDING DEMO
- 23 RECAP
- 24 MISSING PERSISTENCE & CONCEALMENT
- 25 PERSISTENT AND CONCEALED
- 26 SHADOW CONTAINER-SHUTDOWN SCRIPT
- 27 SHADOW CONTAINER - MYSCRIPT.SH
- 28 FULL ATTACK DEMO
- 29 ADVANCED PERSISTENT THREAT
- 30 SHADOW WORM
- 31 ATTACK FLAVORS
- 32 MITIGATION
- 33 BLACK HAT SOUND BYTES