How Abusing Docker API Led to Remote Code Execution, Same Origin Bypass & more

Дата: 18.12.2017. Автор: CISO CLUB. Категории: Подкасты и видео по информационной безопасности

Well, that Escalated Quickly! How Abusing Docker API Led to Remote Code Execution, Same Origin Bypass and Persistence in the Hypervisor via Shadow Containers

With over 5 billion pulls from the Docker Hub, Docker is proving to be the most dominant technology in an exploding trend of containerization. An increasing number of production applications are now running inside containers; and to get to production, developers first use containers on their own machines.

By Michael Cherny & Sagie Dulce

Full Abstract & Presentation Materials:
https://www.blackhat.com/us-17/briefings.html#well-that-escalated-quickly-how-abusing-docker-api-led-to-remote-code-execution-same-origin-bypass-and-persistence-in-the-hypervisor-via-shadow-containers

CISO CLUB

Об авторе CISO CLUB

Редакция портала cisoclub.ru. Добавляйте ваш материал на сайт в разделе "Разместить публикацию".
Читать все записи автора CISO CLUB

Добавить комментарий

Ваш адрес email не будет опубликован. Обязательные поля помечены *