Overview
Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Explore Kubernetes security vulnerabilities through live hacking demonstrations in this conference talk that reveals how attackers can exploit insecure workload configurations to compromise user accounts. Witness interactive demos showing real-time account hijacking in Kubernetes applications while learning about critical security risks from the OWASP Kubernetes Top 10 list. Discover various exploitation techniques targeting misconfigurations in Kubernetes clusters, including privilege escalation attacks on pods and containers that can lead to complete compromise of web applications. Focus on understanding Insecure Workload Configuration and Lack of Centralized Policy Enforcement vulnerabilities through practical examples that demonstrate how seemingly minor misconfigurations can create significant security breaches in production environments.
Syllabus
GeeCON 2024: P. Węgrzynowicz - The Hacker’s Guide to Insecure Workload Configuration in Kubernetes
Taught by
GeeCON Conference
Reviews
4.0 rating, based on 1 Class Central review
Showing Class Central Sort
-
The explanation was simple and very understandable but the only one problem was the video because there were no subtitles and if I not get they say it was very hard to rewind it. Otherwise everything was perfect