← All talks

Pentesting Cloud Sandboxes in the wild

BSides Munich · 202027:31127 viewsPublished 2020-09Watch on YouTube ↗
Speakers
Tags
CategoryTechnical
TeamRed
About this talk
Building on last year’s explanation of container workings under the hood (F***ing Containers - how do they work?), we explain several techniques for breaking out of misconfigured containers/container hosts. We will discuss the most common misconfigurations (such as extensive container privileges, exposed network services, mounted sockets, internal cluster privileges) and how to test for them. For each discussed attack vector, we will show how it can be automated (and integrated into build pipelines) using a tool of choice. Finally, a comparison of the well known container execution platforms (AWS, Azure, fly.io, GCP, Heroku) will be presented. by Matthias Luft and Jan Harrie