Loading…
Back To Schedule
Sunday, November 22 • 09:00 - 17:00
Kubernetes Overview and exploitation

Sign up or log in to save this to your schedule, view media, leave feedback and see who's attending!

Feedback form is now closed.
Introduction:
This attacker focused, hands-on training will set you on the path to understanding common vulnerabilities in containerized environments (Docker) and get familiar with Kubernetes clusters
It will help you to learn the approach to follow and the process for testing and auditing containers and Kubernetes clusters
By the end of the training participants will able to identify and exploit applications running on containers inside Kubernetes clusters with a hands-on approach

Abstract:
An organization using microservices or any other distributed architecture rely heavily on containers and container orchestration engines like Kubernetes and as such its infrastructure security is paramount to its business operations.
This session will set the base for security testers and DevOps teams to test for common security vulnerabilities and configuration weaknesses across containerized environments and distributed systems. It also helps to understand - the approach and process to audit the Kubernetes environment for security posture.
The courseware is meant to introduce participants to container and cluster management with Kubernetes. The focus is on the security aspects of the application and the container infrastructure. The participants will learn the common tools and techniques that are used to attack applications running in containerized environments.
The participants will be introduced to Kubernetes and learn to assess the attack surfaces applicable for a given application on the cluster
The participants will learn how to audit for security based on best practices using tools and custom scripts

As part of the course delivery, the trainer will share examples of real-world security issues found in penetration
testing engagements to showcase the mapping of the concepts with what usually happens in the real world.

Hardware Requirements
At least 8 GB of RAM, 10GB of Diskspace free on the system
The laptop should support hardware-based virtualization
If your laptop can run a 64-bit virtual machine in Oracle VirtualBox it should work
Network Connectivity

Prerequisites
Basic knowledge of using the Linux command line
System administration basics like servers, applications configuration, and deployment
Familiarity with container environments like Docker and distributed systems would be useful

Take-Aways
Complete hands-on training with a practical approach and real-world scenarios
Presentation and a PDF created for the training session
Resources and references for further learning and practice

Speakers
avatar for Mihir Shah

Mihir Shah

Consultant, Awake Security
Mihir Shah currently works as a threat researcher for Awake Security and is an Industry mentor for Stanford University, he also works as a security Advisory personnel for multiple companies. He has been a prior speaker and trainer at conferences like OWASP Seasides, Kubernetes Day... Read More →


Sunday November 22, 2020 09:00 - 17:00 WIB