Explore a conference talk that delves into Kubernetes security vulnerabilities and cryptojacking risks. Learn about the basics of Kubernetes, its potential security flaws, and how attackers can exploit open dashboards. Examine real-world examples of cryptojacking attempts, including a detailed analysis of Micro Kubernetes installations. Gain insights into detection methods through Wireshark screenshots, post requests, and metadata analysis. Understand the importance of securing Kubernetes deployments and protecting against unauthorized cryptocurrency mining operations.
Overview
Syllabus
Intro
Cryptobooty
What is Kubernetes
Childrens Guide to Kubernetes
Kubernetes Security
Open Dashboards
IP Listing
Kubernetes Dashboard
Research
Cryptojacking
Micro Kubernetes
Installing Micro Kubernetes
First impressions
Wireshark screenshot
Post Request
Kubernetes Object
XMRig
IP Address
Metadata
Commands
Pots
IP Addresses
Resources