DiscoverBlack HatAn Attacker Looks at Docker: Approaching Multi-Container Applications
An Attacker Looks at Docker: Approaching Multi-Container Applications

An Attacker Looks at Docker: Approaching Multi-Container Applications

Update: 2018-08-28
Share

Description

The goal of this talk is to provide a penetration tester experienced in exploitation and post-exploitation of networks and systems with an exposure to containerization and the implications it has on offensive operations.

By Wesley McGrew

Full Abstract & Presentation Materials: https://www.blackhat.com/us-18/briefings/schedule/#an-attacker-looks-at-docker-approaching-multi-container-applications-9975
Comments 
00:00
00:00
x

0.5x

0.8x

1.0x

1.25x

1.5x

2.0x

3.0x

Sleep Timer

Off

End of Episode

5 Minutes

10 Minutes

15 Minutes

30 Minutes

45 Minutes

60 Minutes

120 Minutes

An Attacker Looks at Docker: Approaching Multi-Container Applications

An Attacker Looks at Docker: Approaching Multi-Container Applications

Black Hat