Overview
Syllabus
aqua Well. That Escalated Quickly!
FOCUS
MENU
VIRTUAL MACHINES VS CONTAINERS
CONTAINERS EVERYWHERE
CONTAINER ADOPTION STATS
DEVELOPERS AS TARGETS
ATTACK OVERVIEW -WINDOWS 10
DOCKER 4 WINDOWS / MAC
BROWSER SECURITY
SAME ORIGIN POLICY (SOP)
DOCKER API CALLS THAT DON'T VIOLATE SOP
BUILD IMAGE API CALL → REVERSE SHELL DEMO
ABUSE DOCKER BUILD
DOCKER FIX
WHAT'S NEXT?
LIMITATIONS
DNS REBINDING - HISTORY
DNS REBINDING - HOW IT WORKS
WHY NOT USE DNS REBINDING?
ATTACKING LLMNR
HOST REBINDING DEMO
RECAP
MISSING PERSISTENCE & CONCEALMENT
PERSISTENT AND CONCEALED
SHADOW CONTAINER-SHUTDOWN SCRIPT
SHADOW CONTAINER - MYSCRIPT.SH
FULL ATTACK DEMO
ADVANCED PERSISTENT THREAT
SHADOW WORM
ATTACK FLAVORS
MITIGATION
BLACK HAT SOUND BYTES
Taught by
Black Hat