Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Post-Exploiting a Compromised ETCD

CNCF [Cloud Native Computing Foundation] via YouTube

Overview

Explore advanced post-exploitation techniques for a compromised ETCD in this informative conference talk by Luis Toro Puig from NCC Group. Delve into the potential consequences of an ETCD breach, whether at the container or host level, and discover how understanding Kubernetes' data injection mechanisms into ETCD can be leveraged for malicious purposes. Learn about methods for tampering with data, injecting rogue pods, establishing persistence within a cluster, and circumventing scheduler logic and AdmissionController restrictions. Gain valuable insights into the far-reaching implications of ETCD compromise and enhance your knowledge of Kubernetes security vulnerabilities.

Syllabus

Post-Exploiting a Compromised ETCD - Luis Toro Puig, NCC Group

Taught by

CNCF [Cloud Native Computing Foundation]

Reviews

Start your review of Post-Exploiting a Compromised ETCD

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.