☁️ Cloud security
Search
Search
Dark mode
Light mode
Explorer
Container Images & Supply Chain Attacks
1 - Malicious Containers Spreading Through Public Registries
2 - Investigating a Malicious Docker Image
3 - Reverse-Engineering a Malicious Dockerfile
4 - Demonstrating the Risks of Malicious Docker Images
Disasters
Capital One 2019 Data Breach
CloudBleed - 2017 Cloudflare Data Leak
iCloud 2014 Private Pictures Leak
Introduction
History of cloud computing
Investigation
1-How it all began
2-Article Review
3-Putting Everything together
Practice
0-Breaking Kubernetes
1-Setting up an environement
2-Provisioning the VMs
3-Configuring Kubernetes with k3s and Ansible
4-Attack Scenario
Glossary
Setting up DNS with Cloudflare
Home
❯
Practice
Folder: Practice
7 items under this folder.
Mar 12, 2025
1-Setting up an environement
Mar 12, 2025
4-Attack Scenario
Mar 12, 2025
Glossary
Mar 12, 2025
Setting up DNS with Cloudflare
Mar 12, 2025
3-Configuring Kubernetes with k3s and Ansible
Mar 12, 2025
0-Breaking Kubernetes
Mar 12, 2025
2-Provisioning the VMs