Attacking and Defending Kubernetes
Many companies have deployed Kubernetes, but few infosec folks have experience attacking it. We aim to address that shortage, culminating in an audience-directed Choose Your Own Adventure, movie-themed demo against an intentionally-vulnerable cluster named Bust-a-Kube. You’ll see how to attack Kubernetes clusters and learn what hardening techniques and freely available tools can break those attacks. We’ll review the components of a Kubernetes cluster, then show how a threat actor can …