Get a hands-on introduction to attacking and defending Kubernetes (k8s)! Remotely-controlling a Kali Linux system, attendees will attack a new capture-the-flag scenario in the open source Bust-a-Kube Kubernetes cluster. Once they have busted their way into cluster admin, they'll use that access to harden the cluster and block an attack. Come get some direct experience with Kubernetes security!
This session will follow Chatham House Rule to allow for free exchange of information and learning. We look forward to participants actively engaging in the discussion, and remind attendees that no comment attribution or recording of any sort should take place.
Attendees should have a working knowledge of Linux.
This is a capacity-controlled session. If added to your schedule and your availability changes, please remove this session from your schedule to allow others to participate.
Cloud Security Open Source Tools
cloud security penetration testing virtualization, containerization & segmentation orchestration & automation container security
Share With Your Community