Live Security Hack - Hack My Mis-configured Kubernetes

Live Security Hack - Hack My Mis-configured Kubernetes

Linux Foundation via YouTube Direct link

Directory traversal vulnerability

10 of 26

10 of 26

Directory traversal vulnerability

Class Central Classrooms beta

YouTube playlists curated by Class Central.

Classroom Contents

Live Security Hack - Hack My Mis-configured Kubernetes

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Introduction
  2. 2 Demo Overview
  3. 3 Thought Process
  4. 4 What We Know
  5. 5 Timeline of Doom
  6. 6 Environment Variables
  7. 7 Network Information
  8. 8 Service Token
  9. 9 Update Timeline
  10. 10 Directory traversal vulnerability
  11. 11 Access Matrix
  12. 12 Secure namespace
  13. 13 Security boundary
  14. 14 Readonly root file system
  15. 15 Spawn root pod
  16. 16 Spawn nonroot container
  17. 17 Exploring the network
  18. 18 Update
  19. 19 Hack with new token
  20. 20 That was awesome
  21. 21 Confidentiality Availability Integrity
  22. 22 Container Primitives
  23. 23 Container Image
  24. 24 Critical Execution Path
  25. 25 Change Defaults
  26. 26 Be Careful With Your Code

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.