Главная
Study mode:
on
1
Introduction
2
Agenda
3
Definition
4
Open Source
5
Distributions
6
Big Data Environment
7
Authentication
8
Kerberos
9
Authorization Auditing
10
Encryption
11
Map Attack Surface
12
Topologies
13
Services
14
What do you want
15
Demo
16
Kerberos Security
17
G Mode
18
HDFS Groups
19
Search Party Modules
20
User System Cookies
21
Key Tabs
22
Conclusion
Description:
Explore the vulnerabilities in Hadoop clusters and Big Data frameworks in this 51-minute conference talk from HITB Security Conference. Dive into the security issues surrounding Hadoop infrastructure, learning about attack vectors and practical methods to access data lakes. Understand the Hadoop (in)security model, core security mechanisms, and discover tools and techniques for penetrating cluster defenses. Gain insights into patch management challenges and long-standing vulnerabilities in the Hadoop ecosystem. Follow along as security experts Thomas Debize and Mahdi Braik demonstrate real-world examples of exploiting Hadoop weaknesses to access sensitive data and obtain remote system access on cluster members.

Hadoop Safari - Hunting for Vulnerabilities

Hack In The Box Security Conference
Add to list
0:00 / 0:00