Kubernetes
Learning Resources and Tools
InGuardians has served as members of the Kubernetes project Security Audit Working Group and includes a Kubernetes project contributor. The team has also developed Open Source projects for Kubernetes, including Peirates, a Kubernetes penetration testing tool, and Bustakube, an intentionally-vulnerable Kubernetes cluster built as a teaching tool.
LEARNING RESOURCES
Upcoming workshops:
Free Workshop: Attacking and Defending Kubernetes, Hands-On
Get a hands-on introduction to attacking and defending Kubernetes (k8s)! We’ll first talk about Kubernetes and then you’ll do a step-by-step hands-on exercise. Remotely controlling a Kali Linux system, you’ll attack a capture-the-flag scenario in a Kubernetes cluster. Once you’ve busted your way to cluster admin, you’ll use your access to harden the cluster and block your attack. Come get some direct experience with Kubernetes security!
This workshop doesn’t require you to have any experience with containers or Kubernetes. It is accessible to anyone comfortable with a Linux command line.
Upcoming Dates:
TBA
Free Workshop: Kubernetes for Newbies, Hands-On
Are you interested in learning about Kubernetes, but have never touched a cluster? Come learn and get your hands dirty with a step-by-step exercise. We’ll first introduce what Kubernetes does and how to use it, then give you a cluster to try out what you’ve learned. Come check “learn about Kubernetes” off your someday-soon list!
This workshop doesn’t require you to have any experience with containers or Kubernetes. It is accessible to anyone comfortable with a Linux command line.
Upcoming dates:
TBA
Tools
Bust – A – Kube
Bust -A -Kube is an intentionally-vulnerable Kubernetes cluster, intended to help people self-train on attacking and defending Kubernetes clusters.
Peirates
Peirates is a penetration testing tool for Kubernetes, focused on privilege escalation and lateral movement. It has an interactive interface, wherein the penetration tester chooses actions from the techniques that Peirates encodes. Some of the techniques in Peirates will give you administrative access to the cluster in one-shot. Others are intended to get you tokens for an increasing number of service accounts that you can use to move laterally, steal secrets, and chain together to achieve the goals of your penetration test.
Featured Videos
Hacking And Hardening Kubernetes
Jay Beale, CTO, InGuardians
This webinar was recorded on 3/28/19
With microservices’ rise, Kubernetes gain adopters every day. It’s time for information security specialists to learn how to attack and defend container orchestration systems. This webinar will demonstrate attacks on Kubernetes clusters, then defenses that break those attacks.
Kubernetes Practical Attack And Defense
Jay Beale, CTO, InGuardians
RSA Conference 2020
A rising tide of engineering teams are running Kubernetes clusters. As an infosec professional, you need to understand attacks on Kubernetes and container-based applications. In this talk, we’ll demo Kubernetes attacks on the open-source Bust-a-Kube cluster, both manually and via the open-source Peirates tool. We’ll teach you how to attack and how to break your attacks.
Kubernetes Practical Attack And Defense – Scott Pilgrim Edition
Jay Beale, CTO, InGuardians
Blue Hat 2019
See attack and defense on Kubernetes, using a movie-themed “capture the flag” scenario. Included among the defenses: using pod security policies, root capability limits and AppArmor.
Want to see all of our videos? Subscribe to our YouTube channel!
Blog
Hacking and Defending a Kubernetes-based Application (Part of the BeyondTrust webinar series)
Container orchestration tools are all the buzz right now. It almost seems like every company in the DevOps modality is either using or moving to Kubernetes, Docker Swarm, or one of their competitors. In this on-demand webinar, InGuardians CTO, Jay Beale, will hack a...
Load Balancing IDS
By Brian Laing and Jimmy Alderson https://inguardians.box.com/shared/static/3swck8ula5mx5qosjwne1w3ptd4fq50j.pdf
Snort GUIs
Exploring the ins and outs of Snort front ends by Mike Poor https://inguardians.box.com/shared/static/hcx7dfnn87kckatukunngao107scyiz1.pdf
Packet Craft for Defense in Depth
Learning to use packet crafting tools to test our defenses by Mike Poor https://inguardians.box.com/shared/static/4pwaigav97t90b31wvff8mrvl4llb50j.pdf
Complex Signatures
Correlating System and Application Logs with Traffic Traces and IDS Alerts by Mike Poor https://inguardians.box.com/shared/static/papgh6vwh0a4ee4o3snp2dnaz2ey4szq.pdf
Want custom InGuardians training for your team?
While we offer some of the classes through SANS and various infosec conferences, all of our classes are available for private training.