- Maarten PentingaMadhu AkulaA Practical Approach to Breaking & Pwning Kubernetes ClustersCody NelsonDecember 4 - 5, 16 Credits

Maarten Pentinga
Madhu Akula
A Practical Approach to Breaking & Pwning Kubernetes Clusters
Cody Nelson
December 4 - 5, 16 Credits
Maarten Pentinga
The adoption of Kubernetes use in production has increased to 83% from a survey by CNCF. Still, most security teams struggle to understand these modern technologies. In this real-world scenario-based training, each participant will be learning Tactics, Techniques, and Procedures (TTPs) to attack and assess Kubernetes cluster environments at different layers like Supply chain, Infrastructure, Runtime, and many others.
Some of the things you will be doing in this course:
Exploiting Misconfigurations, Private Registries by performing simple Recon
Escaping out of containers to host systems and clusters to gain more access
Escalating privileges, DoS cluster resources, Lateral movement from container
Gaining unauthorized access to namespaces, microservices, data, and logs
Breaking the boundaries of NSP(Network Security Policy), RBAC, Profiles
Defense evasion techniques & Persistence in Cluster Environments
Bypassing the solutions like Policy Engines, Resource limits, and Controls
Evaluating the cluster security using CIS benchmarks and Cluster Audits to find all possible risks
Also, the trainer will provide step by step guide(Digital Book) with resources and references to further your learning.
Skills / Knowledge
- PenTesting
- Risk
Issued on
December 5, 2023
Expires on
Does not expire