What Vulnerabilities? Live Hacking of Containers and Orchestrators

What Vulnerabilities? Live Hacking of Containers and Orchestrators

NDC Conferences via YouTube Direct link

ROLE ASSIGNMENT

44 of 65

44 of 65

ROLE ASSIGNMENT

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

What Vulnerabilities? Live Hacking of Containers and Orchestrators

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 MENTAL HEALTH
  3. 3 COMMUNITY
  4. 4 CLIMATE CHANGE
  5. 5 NOT A SECURITY EXPERT
  6. 6 INSPIRATION HTTPS://YOUTU.BE/IWKIQK8KDK8
  7. 7 KUBERNETES DASHBOARD
  8. 8 POP QUIZ
  9. 9 FIRST REACTION
  10. 10 LETS GET STARTED
  11. 11 LETS OWN A WEBSITE
  12. 12 LETS REVIEW
  13. 13 HAS ANYONE KNOWINGLY CREATED A VULNERABILITY
  14. 14 OWASP
  15. 15 WHAT IS A VULNERABILITY?
  16. 16 EXAMPLE HEARTBLEED
  17. 17 JUMP INTO THE BOX
  18. 18 IMAGE SCANNING
  19. 19 STATIC TOKENS AND PASSWORDS
  20. 20 TIP: SCHEDULED BUILDS
  21. 21 FOCUS ON CI/CD
  22. 22 FAIL IF ITS NOT SECURE
  23. 23 DON'T SSH TO PATCH
  24. 24 REDUCE THE ATTACK VECTOR
  25. 25 PRIVATE CONTAINER REGISTRIES
  26. 26 PULL LATEST
  27. 27 IMAGE TRUST AND SUPPLY CHAIN
  28. 28 CASE STUDY TYLENOL CYANIDE DEATHS
  29. 29 ESCAPE THE CONTAINER
  30. 30 RUNNING CONTAINERS ON KUBERNETES
  31. 31 WHAT COULD POSSIBLY GO WRONG?
  32. 32 EXFILTRATION OF SENSITIVE DATA
  33. 33 ELEVATE PRIVILEGES INSIDE KUBERNETES TO ACCESS ALL WORKLOADS
  34. 34 POTENTIALLY GAIN ROOT ACCESS TO THE KUBERNETES WORKER NODES
  35. 35 PERFORM LATERAL NETWORK MOVEMENT OUTSIDE THE CLUSTER
  36. 36 RUN A COMPROMISED POD
  37. 37 FEATURE DRIVEN
  38. 38 SECURITY FOLLOWS
  39. 39 BEST PRACTICE
  40. 40 REDUCE HOST MOUNTS
  41. 41 DON'T USE ROOT
  42. 42 USER COMMAND IN DOCKERFILE
  43. 43 RBAC
  44. 44 ROLE ASSIGNMENT
  45. 45 ROLE AUTHORISATION
  46. 46 PERMISSION AUTHORISATION
  47. 47 MASTER AND WORKERS
  48. 48 CONTROL PLANE
  49. 49 LAYERED SECURITY APPROACH
  50. 50 ADMISSION CONTROLLER
  51. 51 ALWAYSPULLIMAGES
  52. 52 DENYESCALATINGEXEC
  53. 53 PODSECURITYPOLICY
  54. 54 LIMITRANGE RESOURCEQUOTA
  55. 55 CAN WE SEE WHATS RUNNING
  56. 56 NAMESPACE
  57. 57 NETWORKPOLICIES
  58. 58 PASSING SECRETS TO CONTAINERS
  59. 59 TOOLS
  60. 60 HAIL MARY
  61. 61 RUNTIMES
  62. 62 SERVICE MESHES
  63. 63 RELEASE OFTEN / FAST
  64. 64 CHAOS ENGINEERING
  65. 65 SECURITY UPDATES

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.