Orchestrate This! Kubernetes Rootkit
HTML-код
- Опубликовано: 1 июл 2024
- ...This talk will explore the concept of a container-focused rootkit and how it can be used to conduct and hide malicious activity occurring on a Kubernetes cluster. First, we'll discuss the basic anatomy of a rootkit, and then dive into the specifics of this container-based rootkit, including the consequences of such an attack. Finally, we will explore strategies for mitigating the risks associated with a Kubernetes-based rootkit attack, including best practices for securing your cluster and detecting and responding to potential attacks.
By: Andrew Hughes , Nick Lang
Full Abstract and Presentation Materials: https:www.blackhat.com/eu-23/briefings/schedule/#orchestrate-this-kubernetes-rootkit-34489