The Attacker Perspective - Insights From Hacking Alibaba Cloud... Hillai Ben-Sasson & Ronen Shustin

  Рет қаралды 3,657

CNCF [Cloud Native Computing Foundation]

CNCF [Cloud Native Computing Foundation]

Күн бұрын

Don't miss out! Join us at our next Flagship Conference: KubeCon + CloudNativeCon Europe in Paris from March 19-22, 2024. Connect with our current graduated, incubating, and sandbox projects as the community gathers to further the education and advancement of cloud native computing. Learn more at kubecon.io
The Attacker Perspective - Insights From Hacking Alibaba Cloud's Managed K8s Environments - Hillai Ben-Sasson & Ronen Shustin, Wiz
In this session, we will demonstrate a real-life case study of what an attack on a managed K8s environment looks like, by presenting our step-by-step engagement with Alibaba Cloud. We will begin as an external user, execute code in the managed environment, escalate privileges, escape containers, conduct lateral movement within the Kubernetes environment, and ultimately gain unauthorized read-write access to other customers' databases.
Our session demonstrates how chaining small configuration errors can lead to far-reaching consequences, such as a complete compromise of a managed cluster.
With a deeper understanding of real-world hacker operations in managed K8s environments, the audience will be able to strengthen their deployments and enhance their organization's security posture.

Пікірлер: 4
@alessandro-affinito
@alessandro-affinito 10 ай бұрын
Please share also the slides and links
@NachTheRz
@NachTheRz 10 ай бұрын
A-a-a-a-a-aaaa-a-a-aaa... I really looked forward to the topic but after a while i could no longer continue to watch the video.
@mfreeman451
@mfreeman451 10 ай бұрын
you're missing out, it gets better.
Synyptas 4 | Жігіттер сынып қалды| 3 Bolim
19:27
Я сделала самое маленькое в мире мороженое!
00:43
Кушать Хочу
Рет қаралды 1,7 МЛН
Когда отец одевает ребёнка @JaySharon
00:16
История одного вокалиста
Рет қаралды 11 МЛН
Kubernetes Hacking: From Weak Applications to Cluster Control
36:22
Cilium’s Evolution: The Founding Story of Cilium
50:17
Isovalent
Рет қаралды 2,6 М.
The Tragedy of systemd
47:18
linux.conf.au
Рет қаралды 1,1 МЛН
FASTEST way to become a Cyber Security Engineer and ACTUALLY get a job - UPDATED (2024)
21:37
Do NOT Learn Kubernetes Without Knowing These Concepts...
13:01
Travis Media
Рет қаралды 303 М.
SECURITY HUB UNCONFERENCE: STRIDE threat model for the vSphere CSI Driver
30:48
CNCF [Cloud Native Computing Foundation]
Рет қаралды 61
Xiaomi 15 - АЙФОН ТЕПЕРЬ ДЛЯ НИЩЕБРОДОВ…
12:30
Thebox - о технике и гаджетах
Рет қаралды 233 М.
Проверил, как вам?
1:01
Коннор
Рет қаралды 7 МЛН
iPhone 7
0:13
ARGEN
Рет қаралды 16 МЛН
The force of electromagnetic eddy currents
0:31
Nikola Toy
Рет қаралды 28 МЛН
The damaged battery head isrepaired. #Battery #Repair
0:21
Hak Hang
Рет қаралды 25 МЛН