A hacker's view on Containers and Kubernetes
search
⌘Ctrlk
A hacker's view on Containers and Kubernetes
  • A hacker's view on #containers and #K8S
  • addons
  • doc
  • examples
gitbookPowered by GitBook
block-quoteOn this pagechevron-down

A hacker's view on #containers and #K8S

hashtag
Day 1

1.1 Install docker 1.2 Getting started with Docker 1.3 Creating containers 1.4 Container networking 1.5 Linux namespaces explained 1.6 Backdooring a container 1.7. Vulnerability Scanning 1.8 Container security options 1.9 Docker compliance benchmark 1.10 Optional Struts-RCE 1.11 Optional gaining root

hashtag
Day 2

2.1 Installing Kubernetes 2.2 Install App Routable Demo 2.3 Kubernetes getting started 2.4 Kubernetes services

hashtag
Day 3

3.1 Kubernetes Ingress 3.2 Kubernetes Network Policies 3.3 eBPF Introduction 3.4 Scanning pods for vulnerabilities or misconfiguration 3.5 Scanning your K8S cluster 3.6 Cluster communication deepdive 3.7 Cluster API access via pod & Host 3.8 Cluster compliance benchmarking

hashtag
Appendix

Appendix A - Installing Docker and K8Sdocker_k8s_install Appendix B - Tcpdump Lab Solution Appendix C - Quick App Deployments Appendix D - Installing management tools

Nextaddonschevron-right

Last updated 2 years ago

  • Day 1
  • Day 2
  • Day 3
  • Appendix