Andrew Martin
Hacking Kubernetes: Live Demo Marathon
#1about 8 minutes
Understanding the Kubernetes threat landscape and adversaries
Threat modeling helps build appropriate security controls by identifying potential adversaries, from script kiddies to organized crime.
#2about 3 minutes
Demonstrating a supply chain attack using NPM hooks
A malicious NPM package can use a preinstall hook to execute arbitrary code and exfiltrate sensitive files like SSH or cloud keys from a developer's machine.
#3about 12 minutes
Gaining a reverse shell through pod misconfigurations
An attacker can gain a reverse shell and break out of a container by exploiting pod misconfigurations like privileged mode and sharing the host PID namespace.
#4about 9 minutes
Executing a container breakout using the Dirty Pipe vulnerability
The Dirty Pipe vulnerability allows an unprivileged user to overwrite root-owned files, enabling a container breakout by patching the runc binary in memory.
#5about 7 minutes
Pivoting post-breakout to steal secrets from other pods
After gaining root on a node, an attacker can pivot by enumerating the host filesystem to find and steal secrets mounted into other pods running on the same node.
#6about 5 minutes
Using canary tokens as a last line of defense
Embedding canary tokens, which are credentials with no permissions, provides a tripwire that triggers an intrusion detection alert when an attacker attempts to use them.
Related jobs
Jobs that call for the skills explored in this talk.
Team Lead DevOps (m/w/d)
Rhein-Main-Verkehrsverbund Servicegesellschaft mbH
Frankfurt am Main, Germany
Senior
Matching moments
18:20 MIN
Deconstructing a typical Kubernetes cluster attack chain
Kubernetes Security - Challenge and Opportunity
56:21 MIN
Security best practices for containers and Kubernetes
Microservices: how to get started with Spring Boot and Kubernetes
20:26 MIN
Identifying common Kubernetes security vulnerabilities
Kubernetes Security - Challenge and Opportunity
10:33 MIN
Tools and techniques for Kubernetes development
How I saved 200K/yr in direct costs writing 0 code lines in K8s
03:28 MIN
The prevalence and impact of Kubernetes security incidents
Kubernetes Security Best Practices
12:10 MIN
Understanding common intruder attack vectors
Securing Your Web Application Pipeline From Intruders
07:14 MIN
Addressing unique data protection challenges in Kubernetes
It's all about the Data
08:22 MIN
How attackers exploit developers and packages
Vue3 practical development
Featured Partners
Related Videos
Kubernetes Security - Challenge and Opportunity
Marc Nimmerrichter
Kubernetes Security Best Practices
Rico Komenda
Turning Container security up to 11 with Capabilities
Mathias Tausig
Supply Chain Security and the Real World: Lessons From Incidents
Adrian Mouat
Mastering Kubernetes – Beginner Edition
Hannes Norbert Göring
Chaos in Containers - Unleashing Resilience
Maish Saidel-Keesing
Enhancing Workload Security in Kubernetes
Dimitrij Klesev & Andreas Zeissner
Developing locally with Kubernetes - a Guide and Best Practices
Dan Erez
Related Articles
View all articles



From learning to earning
Jobs that call for the skills explored in this talk.

DevOps Engineer – Kubernetes & Cloud (m/w/d)
epostbox epb GmbH
Berlin, Germany
Intermediate
Senior
DevOps
Kubernetes
Cloud (AWS/Google/Azure)

DevSecOps Engineer: Kubernetes & Cloud Security
Sólo para miembros registrados
Barcelona, Spain
€55-75K
Senior
Bash
Azure
Linux
Kafka
+10

DevSecOps Engineer - Kubernetes & Cloud Security
Sólo para miembros registrados
Barcelona, Spain
€50-75K
Senior
Bash
Azure
Linux
DevOps
+7



Kubernetes Engineer
Dembach Goo Informatik GmbH & Co. KG
Hannover, Germany
Redis
Kafka
DevOps
Ansible
RabbitMQ
+3

DevOPS SRE AWS + Kubernetes
Plexus Tech
Municipality of Madrid, Spain
Go
DevOps
Python
Kubernetes
Amazon Web Services (AWS)

Kubernetes DevOps Engineer
ITERGO Informationstechnologie GmbH
Wels, Austria
€44K
GIT
DevOps
Grafana
Prometheus
+3
