Orchestration Ownage: Exploiting Container-Centric Data Center Platforms


Posted on in Presentations

In this coaching session, we will perform a live hack of a DC/OS environment demonstrating how a remote attacker could compromise your data center by interacting with your various orchestration tools including Mesos, Chronos and Marathon. You will see how a single vulnerability within a container can be used as an initial foothold to compromise every server within your data center.

Participants
Bryce Kunz

Participant

Senior Threat Specialist, Adobe

Mike Mellor

Participant

Director, Information Security, Adobe


Share With Your Community