Speaker
✓ Save up to 433€
✓ Amazon Echo Dot or Arduino for free
✓ Group discount
REGISTER NOW
✓ Save up to 433€
✓ Amazon Echo Dot or Arduino for free
✓ Group discount
REGISTER NOW
✓ 2-in-1 conference package
✓ Team discount
✓ Extra specials for freelancers
REGISTER NOW
✓ 2-in-1 conference package
✓ Team discount
✓ Extra specials for freelancers
REGISTER NOW
Infos
Description
Find and fix container vulnerabilities and compliance issues from build to ship to run. Containers are just as likely to be attacked as third party open source and source code. Hackers can use many old attack vector tactics on new containers, such as application exploits, network attacks or phishing scams. In this demo we’ll show how to hack a Kubernetes container using the Apache Struts vulnerability which was used in the Equifax data breach.