Главная
Study mode:
on
1
Intro
2
Overview
3
Mark Manning
4
Containers
5
Kubernetes
6
Pods
7
OS Stack
8
Challenges
9
Power Maverick
10
Threat Model
11
Direct Access
12
Node Pools
13
ECloud
14
Service Exploit
15
What do we do
16
KubeCTL Role
17
Attack Pods
18
Pod Security Policy
19
Namespaces
20
Serverside request forgery
21
Crew
22
Pod
23
Rebooting
24
All namespaces
25
Summary
26
Multitenant environment
27
Isolation model
28
Kubernetes security
29
Next steps
30
Additional resources
31
Thank you
Description:
Explore real-world Kubernetes security challenges and attack techniques in this comprehensive conference talk from Shmoocon 2020. Dive into tactics, tools, and methodologies for assessing and exploiting Kubernetes clusters, including intercepting service mesh traffic, evading runtime syscall filters, and exploiting custom sidecars. Learn about chaining attacks from compromising build environments to exploiting production applications. Gain practical advice and guidance based on experience from hundreds of containerized environment reviews. Discover the intricacies of container breakouts, attack simulations, devops pipeline architecture reviews, and working with developers on applications leveraging containerization technologies. Cover essential topics such as namespace isolation, Linux kernel controls, syscall filtering, and integration with Docker and Kubernetes. Understand the threat model, direct access challenges, node pools, and service exploits in Kubernetes environments. Explore KubeCTL roles, attack pods, pod security policies, and serverside request forgery. Delve into multi-tenant environments, isolation models, and crucial next steps for enhancing Kubernetes security. Read more

Command and KubeCTL - Real-World Kubernetes Security for Pentesters

0xdade
Add to list