Loading…
LISA18 has ended
Back To Schedule
Tuesday, October 30 • 4:00pm - 5:30pm
Attacking & Auditing Docker Containers LIMITED

Sign up or log in to save this to your schedule, view media, leave feedback and see who's attending!

Feedback form is now closed.
Limited Capacity seats available

Developers and Operations teams (DevOps) have moved towards containers and modern technologies. Attackers are catching up with these technologies and finding security flaws in them. In this workshop, we will look at how we can test for security issues and vulnerabilities in Dockerised environments. Throughout the workshop we will learn how we can find security misconfigurations, insecure defaults and container escape techniques to gain access to host operating system (or) clusters. In the workshop, we will look at real world scenarios where attackers compromised containers to gain the access to applications, data and other assets.


By the end of workshop participants will be able to:
  1. Understand Docker security architecture
  2. Audit containerised environments
  3. Perform container escapes to get access to host environments


The participants will get the following:
  1. A Gitbook(pdf, epub, mobi) with complete workshop content
  2. Virtual machines to learn & practice
  3. Other references to learn more about topics covered in the workshop

Speakers
avatar for Madhu Akula

Madhu Akula

Automation Ninja, Appsecco
Madhu is a security ninja and published author. Madhu’s research papers are frequently selected for major security industry conferences including Defcon 26,24 , Blackhat USA 2018, Appsec EU 2018, All Day DevOps (2016, 2017), DevSecCon (London, Singapore, Boston), DevOpsDays India... Read More →


Tuesday October 30, 2018 4:00pm - 5:30pm CDT
Cumberland Room 3-4