A hacker's view on Containers and Kubernetes
Ctrlk
  • A hacker's view on #containers and #K8S
  • addons
  • doc
  • examples
Powered by GitBook
On this page

A hacker's view on #containers and #K8S

Day 1

1.1 Install docker 1.2 Getting started with Docker 1.3 Creating containers 1.4 Container networking 1.5 Linux namespaces explained 1.6 Backdooring a container 1.7. Vulnerability Scanning 1.8 Container security options 1.9 Docker compliance benchmark 1.10 Optional Struts-RCE 1.11 Optional gaining root

Day 2

2.1 Installing Kubernetes 2.2 Install App Routable Demo 2.3 Kubernetes getting started 2.4 Kubernetes services

Day 3

3.1 Kubernetes Ingress 3.2 Kubernetes Network Policies 3.3 eBPF Introduction 3.4 Scanning pods for vulnerabilities or misconfiguration 3.5 Scanning your K8S cluster 3.6 Cluster communication deepdive 3.7 Cluster API access via pod & Host 3.8 Cluster compliance benchmarking

Appendix

Appendix A - Installing Docker and K8Sdocker_k8s_install Appendix B - Tcpdump Lab Solution Appendix C - Quick App Deployments Appendix D - Installing management tools

Nextaddons

Last updated 2 years ago

  • Day 1
  • Day 2
  • Day 3
  • Appendix