Announcement

Collapse
No announcement yet.

Dagan Henderson & Will Kline - The Call is Coming From Inside The Cluster: Mistakes that Lead to ...

Collapse
X
 
  • Filter
  • Time
  • Show
Clear All
new posts

  • Dagan Henderson & Will Kline - The Call is Coming From Inside The Cluster: Mistakes that Lead to ...

    Dagan Henderson & Will Kline - The Call is Coming From Inside The Cluster: Mistakes that Lead to Whole Cluster Pwnership



    Dagan Henderson, Principal / RAFT, He/Him
    Additional Speaker Name(s)/Pseudonym(s)* and Title(s) and preferred pronouns:
    Will Kline, Senior Principal / Dark Wolf Solutions, He/Him

    Presentation Title: The Call is Coming From Inside The Cluster: Mistakes that Lead to Whole Cluster Pwnership
    Length of presentation: 45 Minutes
    Demo


    Kubernetes has taken the DevOps world by storm, but its rapid uptake has created an ecosystem where many popular solutions for common challenges—storage, release management, observability, etc.—are either somewhat immature or have been “lifted and shifted” to Kubernetes. What critical security smells can pentesters look for when looking at the security of a cluster?

    We are going to talk through five different security problems that we have found (and reported, no 0-days here) in popular open-source projects and how you can look for similar vulnerabilities in other projects.



    SPEAKER BIO:
    Dagan Henderson is a Principal Engineer at Raft, LLC, where he specializes in Kubernetes platform development. Dagan’s interest in hacking dates back to the late 80s when AOL and BBSs were the spots (yep, he hosted a very short lived BBS from his home PC—and it got hacked). His first useful computer program was a DOS BAT on a bootable floppy that removed a very persistent Windows 95 Trojan, which he wrote for the mom-and-pop computer shop he worked at for his first job. While in college, Dagan began working for a medical services provider, and when his acumen with computer systems became well-known, he was asked to evaluate a new electronic medical records system. He was able to identify several information-disclosure vulnerabilities and work with the development team to address them. As his career in software engineering took off, Dagan remained committed to developing secure applications, which is essentially the art of not developing insecure systems, and he remains committed to the practice today. As a 25-year veteran of the industry, Dagan has seen (and made) many, many mistakes. He knows where bodies get buried.
    @techdagan

    Will Kline is a Senior Principal with Dark Wolf Solutions, where he works with different customers to modernize their containerized development environments. He’s been working with Linux containers since the pre-Docker days. He has been attending DEF CON since DEF CON 21. He has been coming back almost every year, becoming increasingly involved with the SOHOplessly Broken IoT CTF and the Wireless CTF. At DEF CON 25 his team “Wolf Emoji” took a Black Badge. In his recent work with Dagan, he has been excited to see the intersection between his off-hours hacking fun and real world cloud architecture and SRE work.

    REFERENCES:
    Previous talks that we’ve learned from in the past:
    - DEF CON 27: “Attacking and Defending Kubernetes Clusters”
    - DEF CON 28: “Workshop Kubernetes Security 101 Best Practices”
    - DEF CON Forum: “Securing AND Pentesting the Great Spaghetti Monster (k8s)”
    - Black Hat 2019 “The Path Less Traveled: Abusing Kubernetes Defaults”

    CVEs we reference:
    CVE-2021-36779
    CVE-2021-36980
    CVE-2020-1764
    CVE-2020-1762
    Rancher Advisory: GHSA-wm2r-rp98-8pmh (CVE Pending)

    Last edited by number6; July 4, 2022, 13:46.
Working...
X