{"id":1675,"date":"2018-11-08T23:30:31","date_gmt":"2018-11-09T06:30:31","guid":{"rendered":"https:\/\/zed.inguardians.com\/?p=1675"},"modified":"2020-02-04T19:15:08","modified_gmt":"2020-02-05T02:15:08","slug":"kubernetes-hacking-and-hardening-episode-2-bust-a-kube","status":"publish","type":"post","link":"https:\/\/zed.inguardians.com\/presentations\/kubernetes-hacking-and-hardening-episode-2-bust-a-kube\/","title":{"rendered":"Kubernetes Hacking and Hardening Episode 2: Bust a Kube (Part of the BeyondTrust webinar series)"},"content":{"rendered":"
Jay Beale returns to Kubernetes hacking, with another in his \u201cBust A Kube\u201d attack and defense series.<\/p>\n
In this demo-focused on-demand webinar, Jay will attack a vulnerable Internet-based application, only to discover that the application runs in a Docker container, as part of a pod staged by Kubernetes. Jay will compromise the cluster, then teach you two proactive Kubernetes hardening methods that would break his attack.<\/p>\n
<\/p>\n
<\/p>\n
https:\/\/www.beyondtrust.com\/resources\/webinar\/kubernetes-hacking-hardening-episode-2-bust-kube\/<\/p>\n