Upgrade to Pro — share decks privately, control downloads, hide ads and more …

Breaking & Pwning Docker Containers & Kubernete...

Madhu Akula
November 07, 2019

Breaking & Pwning Docker Containers & Kubernetes Clusters - All Day DevOps 2019

An organization using micro services or any other distributed architecture rely heavily on containers and orchestration engines like Kubernetes and as such its infrastructure security is paramount to its business operations. This talk will focus on how attackers can break into docker container and kubernetes clusters to gain access, escalate privileges to infrastructure by using misconfigurations and application security vulnerabilities. Speaker will share examples of real world security issues found in penetration testing engagements to showcase mapping of the attack usually happens in the real world.

By the end of the talk participants will able to identify and exploit vulnerabilities in applications running on containers inside Kubernetes clusters. The key take away for audience will be learning from these scenarios how they can assess their environments and fix them before attackers gain control over their infrastructure.

Madhu Akula

November 07, 2019
Tweet

More Decks by Madhu Akula

Other Decks in Technology

Transcript

  1. About - Madhu Akula • Security Automation Engineer at Appsecco

    • Passionate about (Cloud, Containers and Kubernetes) security • Speaker & Trainer @ BlackHat, DEF CON, USENIX LISA, OWASP Appsec EU, All Day DevOps, DevSecCon, Nullcon, null, etc. • Co-author of Security Automation with Ansible2 book • Discovered vulnerabilities in over 200+ organisations including; Google, Microsoft, LinkedIn, eBay, AT&T, WordPress, NTOP and Adobe, etc. • Holds industry certifications like OSCP and CKA • Never Ending Learner!
  2. Next 30 minutes, I will talk about • It’s not

    about what is Docker, Kubernetes, etc. • Why container infrastructure security is important • What are the common tools, techniques and procedures for testing • Highlights of different real world attacks mapping with vulnerabilities • Showcase common mistakes and misconfigurations • Case studies and reference resources • Next steps for learning more and more
  3. Would you like to learn Docker & Kubernetes? • https://docs.docker.com

    • https://kubernetes.io/docs/home • https://training.play-with-docker.com • https://labs.play-with-k8s.com • https://training.play-with-kubernetes.com • https://www.katacoda.com/learn • Many more...
  4. amicontained - Container Introspection Tool https://github.com/genuinetools/amicontained It helps to find

    out what container runtime is being used as well as features available like capabilities, profiles applied, etc.
  5. trufflehog - Hardcoded sensitive information • Commiting the sensitive information

    to version control systems • Not including the sensitive files in the build process using .dockerignore file • This is one of the common mistake in modern era
  6. Always look for env variables • This is one of

    the common places most developers and operations teams store secrets, API keys, etc. • Also it contains other information like different service or cluster related information
  7. SSRF in the kubernetes world like a Cluster Pwn •

    In the Google Cloud (GCP), we have to use Metadata-Flavor: Google to obtain the metadata • Now GKE offers to protect kube-env using metadata concealment proxy and workload identity
  8. docker-bench-security https://github.com/docker/docker-bench-security • A script that checks for dozens of

    common best-practices around deploying Docker containers in production ◦ Host configuration ◦ Docker daemon configuration and files ◦ Docker container images ◦ Docker runtime ◦ Docker security operations ◦ Docker swarm configuration
  9. kube-bench - CIS Kubernetes Benchmark https://github.com/aquasecurity/kube-bench • Master Node Security

    Configuration ◦ API Server ◦ Scheduler ◦ Controller Manager ◦ Configuration Files ◦ etcd ◦ General Security Primitives ◦ PodSecurityPolicices • Worker Node Security Configuration ◦ Kubelet ◦ Configuration Files
  10. kube-hunter • Kube-hunter hunts for security weaknesses in Kubernetes clusters.

    The tool was developed to increase awareness and visibility for security issues in Kubernetes environments. You should NOT run kube-hunter on a Kubernetes cluster you don't own!
  11. https://github.com/Frichetten/CVE-2019-5736-PoC • This is a Go implementation of CVE-2019-5736, a

    container escape for Docker. The exploit works by overwriting and executing the host systems runc binary from within the container CVE-2019-5736
  12. Want to explore more? • contained.af • Docker Security •

    CIS Benchmarks Docker • Understanding and Hardening Linux Containers • Abusing Privileged and Unprivileged Linux Containers • Container Security Notes • Linux Container Security • Docker Runtime Privileges and Capabilities • Apparmor Security Profiles on Docker • Seccomp Security Profiles on Docker • Docker Labs Capabilities • Practical SELinux and Containers • Container Security Notes gist • Containers and Operating systems morning paper gist • Kubernetes Security Info • Kubernetes Webinar series • Kubernetes Network Policies