Download pdf
In this coaching session, we will perform a live hack of a DC/OS environment demonstrating how a remote attacker could compromise your data center by interacting with your various orchestration tools including Mesos, Chronos and Marathon. You will see how a single vulnerability within a container can be used as an initial foothold to compromise every server within your data center.