Главная
Study mode:
on
1
Intro
2
Cryptobooty
3
What is Kubernetes
4
Childrens Guide to Kubernetes
5
Kubernetes Security
6
Open Dashboards
7
IP Listing
8
Kubernetes Dashboard
9
Research
10
Cryptojacking
11
Micro Kubernetes
12
Installing Micro Kubernetes
13
First impressions
14
Wireshark screenshot
15
Post Request
16
Kubernetes Object
17
XMRig
18
IP Address
19
Metadata
20
Commands
21
Pots
22
IP Addresses
23
Resources
Description:
Explore a conference talk that delves into Kubernetes security vulnerabilities and cryptojacking risks. Learn about the basics of Kubernetes, its potential security flaws, and how attackers can exploit open dashboards. Examine real-world examples of cryptojacking attempts, including a detailed analysis of Micro Kubernetes installations. Gain insights into detection methods through Wireshark screenshots, post requests, and metadata analysis. Understand the importance of securing Kubernetes deployments and protecting against unauthorized cryptocurrency mining operations.

Prepare to Be Boarded - A Tale of Kubernetes Plunder and Cryptobooty

Add to list