Andrew Martin

Hacking Kubernetes: Live Demo Marathon

It starts with one malicious NPM package and ends with cloud account takeover. This live demo shows the entire attack path.

Hacking Kubernetes: Live Demo Marathon
#1about 8 minutes

Understanding the Kubernetes threat landscape and adversaries

Threat modeling helps build appropriate security controls by identifying potential adversaries, from script kiddies to organized crime.

#2about 3 minutes

Demonstrating a supply chain attack using NPM hooks

A malicious NPM package can use a preinstall hook to execute arbitrary code and exfiltrate sensitive files like SSH or cloud keys from a developer's machine.

#3about 12 minutes

Gaining a reverse shell through pod misconfigurations

An attacker can gain a reverse shell and break out of a container by exploiting pod misconfigurations like privileged mode and sharing the host PID namespace.

#4about 9 minutes

Executing a container breakout using the Dirty Pipe vulnerability

The Dirty Pipe vulnerability allows an unprivileged user to overwrite root-owned files, enabling a container breakout by patching the runc binary in memory.

#5about 7 minutes

Pivoting post-breakout to steal secrets from other pods

After gaining root on a node, an attacker can pivot by enumerating the host filesystem to find and steal secrets mounted into other pods running on the same node.

#6about 5 minutes

Using canary tokens as a last line of defense

Embedding canary tokens, which are credentials with no permissions, provides a tripwire that triggers an intrusion detection alert when an attacker attempts to use them.

Related jobs
Jobs that call for the skills explored in this talk.

test

Milly
Vienna, Austria

Intermediate

test

Milly
Vienna, Austria

Intermediate

Featured Partners

Related Articles

View all articles
Learning Kubernetes made easy with KubeCampus
Learning to use Kubernetes? KubeCampus by Kasten offers free educational content for all skill levels to get you started!Kubernetes is an open-source system for deploying, scaling and managing containerized applications. It allows you to deploy your ...
Learning Kubernetes made easy with KubeCampus
CH
Chris Heilmann
Dev Digest 138 - Are you secure about this?
Hello there! This is the 2nd "out of the can" edition of 3 as I am on vacation in Greece eating lovely things on the beach. So, fewer news, but lots of great resources. Many around the topic of security. Enjoy! News and ArticlesGoogle Pixel phones t...
Dev Digest 138 - Are you secure about this?
CH
Chris Heilmann
All the videos of Halfstack London 2024!
Last month was Halfstack London, a conference about the web, JavaScript and half a dozen other things. We were there to deliver a talk, but also to record all the sessions and we're happy to share them with you. It took a bit as we had to wait for th...
All the videos of Halfstack London 2024!
CH
Chris Heilmann
Dev Digest 126 - * yells at cloud
Hello there, during the WeAreDevelopers World Congress last week many people got stranded on their way home because of the CrowdStrike debacle. But all worked out and we will be back 2025! Tickets are already available and you can try your luck at th...
Dev Digest 126 - * yells at cloud

From learning to earning

Jobs that call for the skills explored in this talk.