{"id":1675,"date":"2018-11-08T23:30:31","date_gmt":"2018-11-09T06:30:31","guid":{"rendered":"https:\/\/zed.inguardians.com\/?p=1675"},"modified":"2020-02-04T19:15:08","modified_gmt":"2020-02-05T02:15:08","slug":"kubernetes-hacking-and-hardening-episode-2-bust-a-kube","status":"publish","type":"post","link":"https:\/\/zed.inguardians.com\/presentations\/kubernetes-hacking-and-hardening-episode-2-bust-a-kube\/","title":{"rendered":"Kubernetes Hacking and Hardening Episode 2: Bust a Kube (Part of the BeyondTrust webinar series)"},"content":{"rendered":"

Jay Beale returns to Kubernetes hacking, with another in his \u201cBust A Kube\u201d attack and defense series.<\/p>\n

In this demo-focused on-demand webinar, Jay will attack a vulnerable Internet-based application, only to discover that the application runs in a Docker container, as part of a pod staged by Kubernetes. Jay will compromise the cluster, then teach you two proactive Kubernetes hardening methods that would break his attack.<\/p>\n

 <\/p>\n

 <\/p>\n

https:\/\/www.beyondtrust.com\/resources\/webinar\/kubernetes-hacking-hardening-episode-2-bust-kube\/<\/p>\n

Watch a Full Video Here<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"

Jay Beale returns to Kubernetes hacking, with another in his \u201cBust A Kube\u201d attack and defense series. In this demo-focused on-demand webinar, Jay will attack a vulnerable Internet-based application, only to discover that the application runs in a Docker container, as part of a pod staged by Kubernetes. Jay will compromise the cluster, then teach […]<\/p>\n","protected":false},"author":7,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[171,51,57],"tags":[71,102,96,95,65,61,56,66],"_links":{"self":[{"href":"https:\/\/zed.inguardians.com\/wp-json\/wp\/v2\/posts\/1675"}],"collection":[{"href":"https:\/\/zed.inguardians.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/zed.inguardians.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/zed.inguardians.com\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/zed.inguardians.com\/wp-json\/wp\/v2\/comments?post=1675"}],"version-history":[{"count":3,"href":"https:\/\/zed.inguardians.com\/wp-json\/wp\/v2\/posts\/1675\/revisions"}],"predecessor-version":[{"id":2812,"href":"https:\/\/zed.inguardians.com\/wp-json\/wp\/v2\/posts\/1675\/revisions\/2812"}],"wp:attachment":[{"href":"https:\/\/zed.inguardians.com\/wp-json\/wp\/v2\/media?parent=1675"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/zed.inguardians.com\/wp-json\/wp\/v2\/categories?post=1675"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/zed.inguardians.com\/wp-json\/wp\/v2\/tags?post=1675"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}