Completed
Memory BOMB (5/5)
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
How Hackers Can Breach CI/CD Systems - Security Vulnerabilities and Mitigation
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 CONTINUOUS DELIVERY CONTINUOUS DEPLOYMENT
- 3 The IDE Leaks!
- 4 The BAD ROLE Granularity!
- 5 The DEV Machine as only source code se
- 6 All Libraries Allowed!
- 7 SECRETS & LEAKS
- 8 Control Artefacts Repository
- 9 The ENVIRONMENT Leak! (1/2)
- 10 The ENV Leak! (2/2)
- 11 A reverse Shell in the Pipeline
- 12 The Evil GitHub Actions!
- 13 The mighty CI BOT
- 14 The EVIL AGENT (1/3)
- 15 The EVIL AGENT (3/3)
- 16 The DOCKER HUB Leak!
- 17 Keep API Safe!
- 18 The SOURCE CODE ransomware!
- 19 The Fat DOCKER!
- 20 The evil DOCKER twin!
- 21 The Greedy Service consumer!
- 22 Run FREE Internet!
- 23 The Trojan Jar!
- 24 The ZIP BOMB (2/4)
- 25 The ZIP BOMB (4/4)
- 26 Memory BOMB (3/5)
- 27 Memory BOMB (5/5)
- 28 Fork BOMB! (1/2)
- 29 Is your API Honest!? (1/2)
- 30 Keep SECRETS safe!
- 31 The Evil Alias!
- 32 The Shared infra! (1/2)
- 33 The TIP Of the iceberg