Orchestration Ownage: Exploiting Container-Centric Data Center Platforms

Posted on in Presentations

In this coaching session, we will perform a live hack of a DC/OS environment demonstrating how a remote attacker could compromise your data center by interacting with your various orchestration tools including Mesos, Chronos and Marathon. You will see how a single vulnerability within a container can be used as an initial foothold to compromise every server within your data center.

Bryce Kunz


Senior Threat Specialist, Adobe

Mike Mellor


Director, Information Security, Adobe

Share With Your Community