Главная
Study mode:
on
1
Introduction
2
Fabian Kammel
3
Agenda
4
Threat Modeling
5
Microsoft Threat Matrix
6
Setting the Stage
7
Initial Access Recap
8
Vulnerability Enumeration
9
What have we witnessed
10
How would we mitigate
11
What have we seen
12
What can we do
13
Unauthorized access
14
Recap
15
Demo 5 Poisoned Image
16
Lessons Learned
17
Mitigations
18
Attack Vector
19
Delete Events
20
Distribution Dependent
21
Wrap Up
Description:
Watch a live demonstration of hacking and defending Kubernetes clusters in this conference talk. Explore common attacks and offensive techniques against Kubernetes clusters and workloads, along with runtime controls to protect against them. Witness scenarios including leveraging compromised containers, exploiting RBAC misconfigurations, and hijacking entire clusters. Learn how to contextualize attacks using threat model resources like the MITRE ATT&CK® Containers Matrix and CNCF Financial Services User Group attack trees. Gain insights on threat modeling, security testing, and defending your own Kubernetes clusters through practical examples and expert explanations.

Hacking and Defending Kubernetes Clusters - Live Demonstration

CNCF [Cloud Native Computing Foundation]
Add to list
0:00 / 0:00