|3 February||Wednesday||0900-17:00 CET/GMT +1||8 Hours|
|4 February||Thursday||0900-17:00 CET/GMT +1||8 Hours|
This training is designed for RedTeam and BlueTeam professionals who are looking for practical applied security knowledge on containerization and orchestration from an offensive and defensive point of view. Black Box, Grey Box and White Box analysis are covered on Docker, Docker Swarm and Kubernetes.
From the offensive side, attack techniques related to containers/pods compromising, exploitation, networking abuses, privileges escalation, persistence, lateral movement and node takeover among others will be explained.
On the defensive side, it will be analyzed the common security issues and a secure way of building docker images and YAML deployment files for Swarm and Kubernetes, the right implementation of RBAC access management and vulnerability scanners on files and CI/CD pipelines will also be presented with many other best practices.
• Architecture • Containers • Images • Networking • Volumes
• Recognizing container environments • Container introspection: named/bind volumes, sensitive data and more • Scanning docker networks • Abusing docker networks defaults • Pivoting: compromising the whole docker environment • Sorting shell limitations • Abusing privileged containers • Abusing docker.sock exposure • Abusing Docker API exposure • Abusing Docker Registry API exposure
• Dockerfile inspection • Distroless and Multi-stage builds • USER command • Docker compose files inspection
• Daemon rootless mode • Securing docker socket and API • Kernel capabilities • SystemCall restriction • Mandatory Access Control • UID & GID management • User-namespace remapping • Control Groups
• Nodes & services management • Networking
• Differences between Docker and Docker Swarm • Dump Swarm Secrets and Configs • Abusing Swarm networks features • Pivoting across containers in multi-services & escalated environments • Pivoting across different Swarm networks: from frontend to backend • Persistence: Creating backdoored services
• Stack files inspection • Developing secure stack files
• Networks isolation • Network traffic encryption • Swarm secrets • Raft-logs key encryption
• Architecture and Components • Pods management • Networking
• Detecting kubernetes orchestration from inside containers • Container introspection: Persistent volumes, secrets, configmaps and more • Discovering & Scanning pods along the entire cluster • Pivoting across pods and namespaces • Abusing Service Account Token • Abusing Kube API exposed • Abusing Kubelet API exposed
• Cluster inspection • Services scanning • RBAC audit • Abusing impersonation • Token bruteforce • Backdoors and node takeover
• YAML inspection • Kubernetes Secrets • RBAC inspection
• Securing kubernetes' components communication • API Authentication • API Authorization • Security Context and Policies • Network Policies
• Containers/Images vulnerability scanners • On-deploy vulnerability scanners