Главная
Study mode:
on
1
ADVANCED PERSISTENCE THREATS
2
EARLY K8S ARCHITECTURE
3
GOALS What might an attacker want to do?
4
DEMO Tapping into the API Server Data Flow
5
VALIDATING WEBHOOKS . Virtual
6
DEMO Shadow API Server
7
KUBERNETES VS K3S
8
ALL CLOUDS ARE BROKEN
9
C2: CLUSTER OF CLUSTERS 23 Virtual
10
WHAT'S COMING
11
COMING FULL CIRCLE
12
RESOURCES
Description:
Explore advanced persistence threats and sophisticated Kubernetes attacks in this 32-minute conference talk. Discover what could happen if a skilled attacker compromises your cluster, including techniques to avoid detection, achieve full cluster access, and maintain persistence. Learn about potential exploits using ephemeral containers and validating webhooks for malicious pod mutations and data exfiltration. Gain insights into deploying "shadow" control planes and other advanced attack methods. Understand how to detect and prevent these threats using practical, proven methods. Delve into topics such as early Kubernetes architecture, API server data flow, validating webhooks, and the differences between Kubernetes and K3s. Examine the vulnerabilities in cloud environments and explore the concept of "Cluster of Clusters" for command and control. Prepare for future attack vectors and access valuable resources to enhance your Kubernetes security posture.

Advanced Persistence Threats - The Future of Kubernetes Attacks

CNCF [Cloud Native Computing Foundation]
Add to list