Tuesday, April 27, 2021
Attacker's use one of three things to exploit and gain access to protected systems. The lack of (or misconfiguration) of security controls, vulnerabilities in the infrastructure and code itself or social engineering techniques to obtain information that can be used to gain access.
In this talk, we shall see, using demos, various techniques and tactics that attacker's use to gain access to Kubernetes environments and map them to the Kubernetes MITRE ATT&CK framework.
The talk will contain the journey of how an attacker moves from gathering information and obtaining initial access to planting backdoors, evading defenses, escalating privileges and eventually causing an impact on the infrastructure.
Download these images to your phone and post using the Instagram app.