Companies Home Search Profile

Container Infrastructure Analysis with kube-hunter

Focused View

Zach Roof

42:45

80 View
  • 1. Course Overview.mp4
    01:12
  • 01. Version Check.mp4
    00:15
  • 02. What Is kube-hunter-.mp4
    04:07
  • 03. Cybersecurity Frameworks.mp4
    03:09
  • 04. Demo Environment Overview.mp4
    03:19
  • 05. Demo Environment Installation.mp4
    02:43
  • 06. Demo 1- Scanning a Kubernetes Cluster.mp4
    05:27
  • 07. Demo 2- nmap and -pods Scan.mp4
    03:22
  • 08. Demo 2- Recap.mp4
    02:03
  • 09. Demo 2- Credential Scan.mp4
    04:41
  • 10. Demo 3- Trivy and Docker History.mp4
    02:53
  • 11. Demo 4- Kubernetes Hardening.mp4
    03:25
  • 12. Demo 4- Modifying the Pod Security Policy.mp4
    02:13
  • 13. Demo 4- Applying the Pod Security Policy.mp4
    02:07
  • 1. Next Steps.mp4
    01:49
  • Description


    Want to learn how to analyze (and prevent) security weaknesses in Kubernetes? If so, you're in the right place! In this course, you will learn Container Infrastructure Analysis with kube-hunter.

    What You'll Learn?


      “Common” Kubernetes (K8s) hardening suggests a focus on the control plane. But what if a cluster could be backdoored through the kubelet? In this course, Container Infrastructure Analysis with kube-hunter, we will use kube-hunter to investigate a K8s attack. First, you will use kube-hunter to enumerate security weaknesses in a K8s cluster. Second, you’ll use kube-hunter findings (i.e., a discovered kubelet endpoint) to investigate privilege escalation. Third, you’ll leverage the privilege escalation findings to detect a persistence method (i.e., a malicious container image) through Trivy . Fourth, you’ll harden K8s so the aforementioned attack can’t occur again! When you’re finished with this course, you’ll have the skills and knowledge to detect these techniques: System Services (T1569), Exploitation for Privilege Escalation (T1068), and Implant Container Image (T1525).

    More details


    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Category
    Zach describes himself as “an ordinary guy who’s extraordinarily curious about technology.” This curiosity has led to roles in Software Development, Application Security, DevOps, and Security Engineering. Currently, Zach is the Lead Security Engineer at Credible where he helps lead the security vision of a highly sensitive Fintech product. Outside of his day job, Zach has spoken at SyntaxCon, created cybersecurity tutorials through Securing The Stack, led an AWS Meetup group, and has provided cybersecurity consulting services. When not hitting the keyboard, Zach is hitting the trails! He is an avid hiker and enjoys the simplicity of nature. In fact, Zach’s favorite quote is “Simplicity is the ultimate sophistication” by Leonardo Da Vinci. Zach’s fondness of simplicity has manifested in his tutorials, where he aims to simplify complex topics in the areas of Software Development, DevOps, and Security.
    Pluralsight, LLC is an American privately held online education company that offers a variety of video training courses for software developers, IT administrators, and creative professionals through its website. Founded in 2004 by Aaron Skonnard, Keith Brown, Fritz Onion, and Bill Williams, the company has its headquarters in Farmington, Utah. As of July 2018, it uses more than 1,400 subject-matter experts as authors, and offers more than 7,000 courses in its catalog. Since first moving its courses online in 2007, the company has expanded, developing a full enterprise platform, and adding skills assessment modules.
    • language english
    • Training sessions 15
    • duration 42:45
    • level average
    • Release Date 2023/01/01