Orchestrate This! Kubernetes Rootkit

Поделиться
HTML-код
  • Опубликовано: 1 июл 2024
  • ...This talk will explore the concept of a container-focused rootkit and how it can be used to conduct and hide malicious activity occurring on a Kubernetes cluster. First, we'll discuss the basic anatomy of a rootkit, and then dive into the specifics of this container-based rootkit, including the consequences of such an attack. Finally, we will explore strategies for mitigating the risks associated with a Kubernetes-based rootkit attack, including best practices for securing your cluster and detecting and responding to potential attacks.
    By: Andrew Hughes , Nick Lang
    Full Abstract and Presentation Materials: https:www.blackhat.com/eu-23/briefings/schedule/#orchestrate-this-kubernetes-rootkit-34489

Комментарии •