Docker Exploitation Framework : Emmanuel Law : Rohit Pitke
Title: Docker Exploitation Framework
Presenter: Emmanuel Law
Co-Presenter: Rohit Pitke
Location: W303
Day,Time: Fri Aug 9 , 10AM - 11:45AM
Audience: Offense, AppSec
Project: https://dockerexploitationframework.github.io/
Abstract:
Docker Exploitation Framework is a cross-platform framework that is focused on attacking container environments (think Kubernetes, docker, etc). It can identify vulnerabilities, misconfigurations, and potential attack vectors. It also helps to automate different stages of a successful kill-chain through features such as:
- Vulnerability scanning
- Container breakouts
- Pod2pod lateral movement
- File layers deep inspection and extraction
- Attack surface discovery and mapping
- Privilege escalation, etc
Bios:
* Presenter:
Emmanuel Law (@libnex) has over a decade of security research experience. He has presented at various international conferences such as Black Hat USA Arsenal, Troopers, Kiwicon, Ruxcon etc. He has also released tools such as Shadow Workers for browser exploitation. He is currently working as a Senior Staff Security Engineer in San Francisco Bay Area.
* Co-Presenter:
Rohit Pitke has been working in the security industry over a decade in various fields like application and infrastructure security, offensive security and security software development. He has presented in various conferences like AppSec USA, AppSec Rome, NullCon.
Title: Docker Exploitation Framework
Presenter: Emmanuel Law
Co-Presenter: Rohit Pitke
Location: W303
Day,Time: Fri Aug 9 , 10AM - 11:45AM
Audience: Offense, AppSec
Project: https://dockerexploitationframework.github.io/
Abstract:
Docker Exploitation Framework is a cross-platform framework that is focused on attacking container environments (think Kubernetes, docker, etc). It can identify vulnerabilities, misconfigurations, and potential attack vectors. It also helps to automate different stages of a successful kill-chain through features such as:
- Vulnerability scanning
- Container breakouts
- Pod2pod lateral movement
- File layers deep inspection and extraction
- Attack surface discovery and mapping
- Privilege escalation, etc
Bios:
* Presenter:
Emmanuel Law (@libnex) has over a decade of security research experience. He has presented at various international conferences such as Black Hat USA Arsenal, Troopers, Kiwicon, Ruxcon etc. He has also released tools such as Shadow Workers for browser exploitation. He is currently working as a Senior Staff Security Engineer in San Francisco Bay Area.
* Co-Presenter:
Rohit Pitke has been working in the security industry over a decade in various fields like application and infrastructure security, offensive security and security software development. He has presented in various conferences like AppSec USA, AppSec Rome, NullCon.