Our containers workshop will be a two-hour workshop that will focus on how we can assess vulnerabilities in containers. As containers are part of the modern software stack, your company may use containers locally on a system and remotely on servers. Containers can be deployed on stand-alone servers, to a container service like AWS ECS, and on orchestration technologies like Kubernetes. Given how ubiquitous containers are, you will likely either be working with or attacking them at some point in your career.
Throughout the workshop, we will be helping you walk through how containers work, how to use them for placing products inside, and then how to assess them for security issues. Our labs will include privilege escalation, pivoting, and container breakout labs. If you want to see a sneak preview of SEC588, or you have taken the course and want to see some additional material in the revamped versions of the courseware, you should attend.
Prior to the workshop: Please download and install the workshop VM here - https://sansurl.com/sec588-workshop-vm
Username: sec588
Password: slingshot
System Requirements: