Outside the Box - Breakouts and Privilege Escalation in Container Environments
BruCON Security Conference via YouTube
Overview
Explore container security vulnerabilities and escape techniques in this 40-minute conference talk from BruCON Security Conference. Dive into the world of container technologies, focusing on their widespread adoption and the potential security risks they pose. Learn about real-world exploitable setups encountered by security professionals, including exposed Docker daemons, Kubernetes API access vulnerabilities in multi-tenant environments, and weak Linux capability blacklists. Discover how seemingly minor misconfigurations can lead to container escapes and privilege escalation. Gain insights into the complex interplay between container technology, Linux kernel, and other subsystems that create attack surfaces. Acquire a methodology for assessing containerized environments, witness demonstrations of attacks against common deployments, and receive configuration recommendations to enhance container security. Leave equipped with knowledge of tools to verify safe configurations and a deeper understanding of the intricate security considerations in container environments.
Syllabus
19 - BruCON 0x0A - Outside the Box Breakouts and Privilege Escalation in Container Environments-Rob
Taught by
BruCON Security Conference