ycliper

Популярное

Музыка Кино и Анимация Автомобили Животные Спорт Путешествия Игры Юмор

Интересные видео

2025 Сериалы Трейлеры Новости Как сделать Видеоуроки Diy своими руками

Топ запросов

смотреть а4 schoolboy runaway турецкий сериал смотреть мультфильмы эдисон
Скачать

BSidesTLV 2024 - "I Own your Cluster" -Taking over AWS clusters using Chain Attack

BSidesTLV

BSidesTLV2024

CyberSecurity

TelAviv

Tel Aviv

Security BSides

Cyberweek

Israel

Автор: BSidesTLV

Загружено: 2024-08-13

Просмотров: 129

Описание: Speaker: Chen Shiri

In this talk, we explore my research into AWS Elastic Kubernetes Service (EKS) that identifies critical vulnerabilities in the service. The talk will focus on two significant security flaws that pose considerable risks to thousands of EKS clusters. We’ll delve into a sophisticated chain attack methodology I’ve developed, which exploits these vulnerabilities to take over Kubernetes nodes and clusters. This attack exposes the risk of unauthorized access and data compromise within Kubernetes environments on AWS. The session will detail how attackers, even with restricted permissions, can bypass existing security measures, breach secured pods, and gain access to the privileged KubeAPI. We will also dissect the AWS EKS architecture, pinpointing the crucial components that facilitate these attacks, thus providing attendees with a deep understanding of the attack chain’s intricacies and its leverage over AWS cloud infrastructure. Session Details: The talk offers critical insights into a significant cybersecurity challenge affecting AWS Elastic Kubernetes Service (EKS). My research reveals two zero-day vulnerabilities that compromise the pod isolation mechanism, potentially impacting numerous organizations.

Key Findings from the Talk: 1. Critical Vulnerabilities: We identify two zero-day vulnerabilities within AWS EKS that allow attackers with limited access to bypass security measures and gain access to privileged KubeAPI and the cluster data. 2. Chain Attack Methodology: The chain attack methodology developed for this research leverages the vulnerabilities to showcase a systemic failure within AWS EKS security. It utilizes instance metadata, Kubernetes capabilities, and AWS mechanisms to gain comprehensive control over entire clusters. 3. Implications: The vulnerabilities discussed carry severe consequences, potentially leading to unauthorized access to sensitive information. 4. Proof of Concept: A live proof of concept video is included in the talk, which clearly demonstrates the execution of the attack, emphasizing the critical need for immediate remediation of these vulnerabilities. Technical Details: • Instance Metadata Exploitation: The attack exploits instance metadata by querying data from the EC2 VM Role, which is accessible from containers within the Kubernetes environment. Through this, an attacker obtains a temporary token and gains access to extensive information about the cloud environment, including ARNs, networking details, and instance-specific data. • Kube-Config Manipulation: By manipulating Kube-Config files, the attacker retrieves and uses information that grants unauthorized access to the Kubernetes cluster, facilitating interaction with the Kubernetes API and providing detailed insights into the cluster’s structure. • Pod Access and Breakout: Successfully breaching pod security, the attacker implements a breakout strategy, gaining access to the node and subsequently to all containers, their data, secrets, and authentication credentials.

Не удается загрузить Youtube-плеер. Проверьте блокировку Youtube в вашей сети.
Повторяем попытку...
BSidesTLV 2024 - "I Own your Cluster" -Taking over AWS clusters using Chain Attack

Поделиться в:

Доступные форматы для скачивания:

Скачать видео

  • Информация по загрузке:

Скачать аудио

Похожие видео

BSidesTLV 2024 - OktaFest – From Your Identity to Your Repository

BSidesTLV 2024 - OktaFest – From Your Identity to Your Repository

LLMs Suck at Cyber Intel—Unless You Hack Them Right - Inga Cherny

LLMs Suck at Cyber Intel—Unless You Hack Them Right - Inga Cherny

Captain MassJacker Sparrow: Uncovering the Malware's Buried Treasure - Ari Novick

Captain MassJacker Sparrow: Uncovering the Malware's Buried Treasure - Ari Novick

Kubernetes — Простым Языком на Понятном Примере

Kubernetes — Простым Языком на Понятном Примере

Kay Wachtelborn «From Zero to Hero – a Guide to Succesful Pilot Training»

Kay Wachtelborn «From Zero to Hero – a Guide to Succesful Pilot Training»

Don't Panic! - CrowdStrike, the biggest PC cyber attack that 7 never was & its lessons -  Gal Urbach

Don't Panic! - CrowdStrike, the biggest PC cyber attack that 7 never was & its lessons - Gal Urbach

Enabling Big Data On RBC’s Hybrid Multi-cloud Platform

Enabling Big Data On RBC’s Hybrid Multi-cloud Platform

Agentic Exposure Hijacking Web Browsing AI Assistants - Sarit Yerushalmi

Agentic Exposure Hijacking Web Browsing AI Assistants - Sarit Yerushalmi

Музыка для работы за компьютером | Фоновая музыка для концентрации и продуктивности

Музыка для работы за компьютером | Фоновая музыка для концентрации и продуктивности

Introduction to AWS IAM Enumeration - (Hacking AWS!)

Introduction to AWS IAM Enumeration - (Hacking AWS!)

КАК УСТРОЕН TCP/IP?

КАК УСТРОЕН TCP/IP?

CI/CD — Простым языком на понятном примере

CI/CD — Простым языком на понятном примере

Чем ОПАСЕН МАХ? Разбор приложения специалистом по кибер безопасности

Чем ОПАСЕН МАХ? Разбор приложения специалистом по кибер безопасности

Почему тебе нужен свой домашний сервер? Показываю реальный опыт HOMELAB

Почему тебе нужен свой домашний сервер? Показываю реальный опыт HOMELAB

Музыка для работы - Deep Focus Mix для программирования, кодирования

Музыка для работы - Deep Focus Mix для программирования, кодирования

Hey AI, how many r in buffer overflow - Yoni Rozenshein

Hey AI, how many r in buffer overflow - Yoni Rozenshein

Водородная бомба

Водородная бомба

Лучший Гайд по Kafka для Начинающих За 1 Час

Лучший Гайд по Kafka для Начинающих За 1 Час

BSidesTLV 2024 - Opening Keynote: The Double Edged Sword: GenAI in Cyber Security Jungle

BSidesTLV 2024 - Opening Keynote: The Double Edged Sword: GenAI in Cyber Security Jungle

Архитектура интернета и веба | Теоретический курс 2026

Архитектура интернета и веба | Теоретический курс 2026

© 2025 ycliper. Все права защищены.



  • Контакты
  • О нас
  • Политика конфиденциальности



Контакты для правообладателей: [email protected]