Get a hands-on introduction to attacking and defending Kubernetes (k8s)! Remotely-controlling a Kali Linux system, attendees will attack a new capture-the-flag scenario in the open source Bust-a-Kube Kubernetes cluster. Once they have busted their way into cluster admin, they'll use that access to harden the cluster and block an attack. Come get some direct experience with Kubernetes security!
This session will follow Chatham House Rule to allow for free exchange of information and learning. We look forward to participants actively engaging in the discussion, and remind attendees that no comment attribution or recording of any sort should take place.
Attendees should have a working knowledge of Linux.
Cloud Security & Virtualization Open Source Tools
cloud security penetration testing virtualization containerization & segmentation orchestration & automation container security
Share With Your Community