Andrew Martin
Hacking Kubernetes: Live Demo Marathon
#1about 8 minutes
Understanding the Kubernetes threat landscape and adversaries
Threat modeling helps build appropriate security controls by identifying potential adversaries, from script kiddies to organized crime.
#2about 3 minutes
Demonstrating a supply chain attack using NPM hooks
A malicious NPM package can use a preinstall hook to execute arbitrary code and exfiltrate sensitive files like SSH or cloud keys from a developer's machine.
#3about 12 minutes
Gaining a reverse shell through pod misconfigurations
An attacker can gain a reverse shell and break out of a container by exploiting pod misconfigurations like privileged mode and sharing the host PID namespace.
#4about 9 minutes
Executing a container breakout using the Dirty Pipe vulnerability
The Dirty Pipe vulnerability allows an unprivileged user to overwrite root-owned files, enabling a container breakout by patching the runc binary in memory.
#5about 7 minutes
Pivoting post-breakout to steal secrets from other pods
After gaining root on a node, an attacker can pivot by enumerating the host filesystem to find and steal secrets mounted into other pods running on the same node.
#6about 5 minutes
Using canary tokens as a last line of defense
Embedding canary tokens, which are credentials with no permissions, provides a tripwire that triggers an intrusion detection alert when an attacker attempts to use them.
Related jobs
Jobs that call for the skills explored in this talk.
Matching moments
18:20 MIN
Deconstructing a typical Kubernetes cluster attack chain
Kubernetes Security - Challenge and Opportunity
20:26 MIN
Identifying common Kubernetes security vulnerabilities
Kubernetes Security - Challenge and Opportunity
03:28 MIN
The prevalence and impact of Kubernetes security incidents
Kubernetes Security Best Practices
56:21 MIN
Security best practices for containers and Kubernetes
Microservices: how to get started with Spring Boot and Kubernetes
39:53 MIN
Q&A on managed Kubernetes security in the cloud
Kubernetes Security - Challenge and Opportunity
20:52 MIN
Key takeaways for hardening Kubernetes clusters
Kubernetes Security Best Practices
10:33 MIN
Tools and techniques for Kubernetes development
How I saved 200K/yr in direct costs writing 0 code lines in K8s
12:10 MIN
Understanding common intruder attack vectors
Securing Your Web Application Pipeline From Intruders
Featured Partners
Related Videos
Kubernetes Security - Challenge and Opportunity
Marc Nimmerrichter
Kubernetes Security Best Practices
Rico Komenda
Turning Container security up to 11 with Capabilities
Mathias Tausig
Mastering Kubernetes – Beginner Edition
Hannes Norbert Göring
Supply Chain Security and the Real World: Lessons From Incidents
Adrian Mouat
Developing locally with Kubernetes - a Guide and Best Practices
Dan Erez
Enhancing Workload Security in Kubernetes
Dimitrij Klesev & Andreas Zeissner
Chaos in Containers - Unleashing Resilience
Maish Saidel-Keesing
Related Articles
View all articles



From learning to earning
Jobs that call for the skills explored in this talk.



Kubernetes Lifecycle & Security Engineer / Distributed Cloud - STACKIT (gn)
Webseite STACKIT
Intermediate
Kubernetes

Technical Application Specialist - Kubernetes / Digital Certificates
Lloyd's
€47-53K
DevOps
Jenkins
Terraform
Kubernetes

Kubernetes Lifecycle & Security Engineer / Distributed Cloud - STACKIT
Schwarz Unternehmenskommunikation GmbH & Co. KG
Senior
Kubernetes


Kubernetes Engineer - Full Remote
Dembach Goo Informatik GmbH & Co. KG
Remote
Redis
Ansible
RabbitMQ
Terraform
+4

