ugotag.com  
  
× ANCIENT WORLD ANIMALS AQUARIUM ARCHERY ARCHITECTURE ART ARTIFICIAL INTELLIGENCE AUDIO BOOKS AVIATION BABY BEAUTY BIG THOUGHTS BIKING BIOLOGY BIRDS BLOCKCHAIN BUSINESS AUTOMOTIVE CATS CHRISTMAS COLD WAR COMPUTER SECURITY CRAFTS CRIME STORIES CRYPTOCURRENCY CSGO DIGITAL COMBAT SIMULATOR DOGS EASTER ECONOMICS ELECTRONICS ENGINEERING ENVIRONMENT FAR CRY 5 FARMING FASHION FISHING FITNESS FOOD & DRINK FORTNITE BATTLE ROYALE FREEDOM OF SPEECH FUNNY GAMBLING GAMING GARDENING GEOPOLITICS GOD OF WAR GUITAR GUNS HALLOWEEN HARRY POTTER HEALTH & WELLNESS HISTORY YOUR HOME HOME REPAIR HOMEBREW INSECTS INTERESTING KIDS KITCHEN KNITTING LAWNCARE LEGO LIQUOR LOCKSPORT MARTIAL ARTS MATH MENS STYLE MINECRAFT MOBILE DEVICES MOTORBIKES MOVIES MULTIPLICATION MUSIC MYSTERY NEUROSCIENCE OLYMPICS ORGANIZATION OUTDOORS PETS PHILOSOPHY PHOTOGRAPHY PHYSICS PI DAY POLITICS POTTERY PRIVACY PROGRAMMING PSYCHOLOGY RECIPE RED DEAD REDEMPTION RELAXING RELIGION REMOTE CONTROL ROCKCLIMBING SCI FI SCI FY SCIENCE SHOOTING SPORTS SKATEBOARDING SPECIAL FORCES SPEECHES SPORTS STAR WARS STEM STPATRICKS STYLE TECHNOLOGY THANKSGIVING TOYS TRAVEL TV VALENTINE'S DAY WAR WEDDING WOODWORKING WW1 WORLD WAR 2
HOME  |  TECHNOLOGY  |  HEALTH  |  FOOD  |  MORE

Episode Markers
  • 05:04
     
    #DEFCON 15 Tactical Exploitation   
    Referencing HD Moore Valsmith DEFCON 15 Tactical Exploitation
  • 05:50
     
    #Prior art in Docker security   
    Prior art in Docker security
  • 09:05
     
    #Where do vulnerabilities come from?    #Vulnerability at layers of abstraction   
    Where do vulnerabilities come from? Vulnerability at layers of abstraction
  • 10:34
     
    #attacker vs developer mindset   
    C example of an attacker vs developer mindset
  • 22:15
     
    #Docker as a Target Application Platform   
    Docker as a Target Application Platform
  • 24:00
     
    #apt-get own tools in Docker   
    Often have to apt-get own tools in Docker
  • 25:00
     
    #Docker application exploitation demo   
    Docker application exploitation demo
  • 27:48
     
    #Metasploit exploitation of Docker   
    Metasploit exploitation of Docker containers.
  • 35:10
     
    #Take Aways   
    Take Aways

An Attacker Looks at Docker: Approaching Multi-Container Applications

The goal of this talk is to provide a penetration tester experienced in exploitation and post-exploitation of networks and systems with an exposure to containerization and the implications it has on offensive operations. By Wesley McGrew






Community tags: computer_security     HOME     SIGN UP     CONTACT US