Orchestration Ownage: Exploiting Container-Centric Data Center Platforms

Posted on in Presentations

In this coaching session, we will perform a live hack of a DC/OS environment demonstrating how a remote attacker could compromise your data center by interacting with your various orchestration tools including Mesos, Chronos and Marathon. You will see how a single vulnerability within a container can be used as an initial foothold to compromise every server within your data center.

Bryce Kunz


Senior Threat Specialist, Adobe

Mike Mellor


Director, Information Security, Adobe

Hackers & Threats

cloud security security operations risk & vulnerability assessment DevSecOps



Share With Your Community