Attacking Container Infrastructure: Docker and Kubernetes Weaknesses

You are here:
Date: June 12, 2025
Time: 2:30 PM WEST | 9:30 AM EDT | 7:00 PM IST

Topic: Attacking Container Infrastructure: Docker and Kubernetes Weaknesses

Register

Abstract: Containers play a crucial role in digital transformation, enabling rapid deployment of cloud-native applications. Though considered secure, container systems have vulnerabilities that stem from the state of their configuration. As organizations increasingly adopt containerized environments to improve scalability and agility, threat actors are evolving to exploit weaknesses within the container infrastructure. In this webinar, we will explore pen testing for Docker and Kubernetes, which act as the backbone of modern DevOps pipelines. Through live demonstrations and case studies, this session will discuss how red teams detect and exploit vulnerabilities within Docker and Kubernetes and deploy backdoors. Attendees will also gain insights into how attackers target containerized workloads and learn strategies to build more resilient, secure environments.

Key Takeaways: 

  • Understanding containers and container security
  • Identifying common misconfigurations and attack vectors in Docker and Kubernetes
  • Applying real-world exploitation techniques in container red teaming
  • Recognizing container image vulnerabilities, exposed dashboards, and privilege escalation
  • Exploring container breach attack vectors: access to lateral movement and persistence
  • Implementing best practices for hardening container infrastructure and mitigating threats

Speaker:

Sergey Chubarov,Security Expert

Bio: Sergey Chubarov is a security and cloud expert and instructor with over 15 years of experience in Microsoft technologies. In his day-to-day job, he helps companies securely embrace cloud technologies. He has earned diverse certifications and recognitions such as Microsoft MVP: Security, OSCP, OSEP, eCPPT, eCPTX, Microsoft Certified Trainer, MCT Regional Lead, C|PSA, C|RT, and EC-Council’s C|EH, C|PENT, L|PT, C|CSE, C|EI, and more. He often speaks at local and international conferences like Global Azure, DEF CON, Black Hat Europe, Wild West Hackin’ Fest, Security BSides, Workplace Ninja, Midwest Management Summit, Hack in the Box, etc.

Share this Article
Facebook
Twitter
LinkedIn
WhatsApp
Pinterest
You may also like

Train with EC-Council

Cyber Talks
Recent Posts