Practical DevOps Security and Exploitation training

. 2 min read

We are proud to announce that Attify will be conducting a 2-day hands-on training class on DevOps security and exploitation. This is one of our new offerings resulting from our extensive experience on pentesting and exploiting corporate infrastructure, CI systems and various DevOps tools used in these environments.

We have conducted this training to some of our corporate clients in the past and this is our first public class. We will be covering a number of topics such as Exploiting popular code versioning systems, orchestration tools, build servers and container platforms.

This course is ideal for you both if you’re a pentester wanting to get into DevOps exploitation or you are a DevOps engineer wanting to learn about how attackers can break into your infrastructure using vulnerabilities in these tools and platforms.

A detailed outline is given below:

  • Code Versioning Systems (Git, GitHub, Bitbucket etc.)- Exploiting the product features

  • Finding existing exploits or implementation loopholes

  • Identifying historically stored sensitive information

  • Hardening and Securing Guidelines

  • Orchestration Tools (Ansible, Saltstack etc.)- Exploiting the access rights and configuration mistakes

  • Use of Orchestration tools to mass deploy the exploits

  • Finding sensitive information

  • Guidelines to securely configure and organise the orchestration tools

  • Build Servers (Jenkins, Hudson etc.)- Pentesting and Vulnerability Assessment

  • Risk involved with Plugins

  • Exploiting most common configuration mistakes

  • Breaking the boundaries with superuser access rights

  • Scheduling vulnerability assessment reports for the CI/CD chain.

  • Guidelines to avoid security issues with integration of various CI/CD tools

  • Container Platform (Docker, Kubernetes etc.)- Pentesting and Vulnerability Assessment

  • Exploiting most common configuration mistakes

  • Guidelines with respect to microservices to avoid bloating containers with superuser access rights

  • Security in Cloud (AWS, Google Cloud etc.)- Configuration best practices for Identity & Access Management Portals

  • Planning right network architecture with use of VPC and VPN

  • Securing instances by running only the required services

  • Configuring instances at the boot time to remove unwanted softwares or upgrade to stable software versions with no known vulnerabilities.

  • Using access tokens and Cloud API’s to regularly rotate keys/passwords.

The seats are limited and we just got notified from the OWASP AppSec team that we have just a few spots left for the class based on our maximum class capacity.

For registration and to know more about the course, you can visit the official webpage here – http://sched.co/B2W6 .

See you in the class!



Attify Team

IoT Security and Penetration Testing

Get IoT Security Training

IoT Pentesting Exploitation Training

Tags

analog modulation Android android application security android hands on security and exploitation training android security Apktool application auditing application security auditing appsec usa appwatch arduino nano arm ARM binaries ARM course ARM exploitation book ARM exploitation video training ARM gadgets ARM Training attify attify badge attify training best security practices biggest iot attacks of all time binwalk blackberry pentesting blackhat ble BLE attacks BLE dangers BLE hacking and exploitation BLE security issues BLE sniffing BLE vulnerabilities bleah bluetooth technology box brut Exception BtleJuice capture radio traffic career in cybersecurity CCTV cameras challenges in iot retail chroot cloud based mobile application security scanner consulting CTF cyber attacks cybersecurity Damn Vulnerable iOS App dangers of iot DDoS attacks devops digital modulation dumping memory embedded hacking expert Exploit ARM devices exploitation exploiting ble exploiting smart devices firmadyne firmware analysis toolkit firmware emulation Firmware hacking firmware reverse engineering Flare-on frida getting started with firmware hacking GSMA guide to ARM exploitation hacked security IP cameras hacked smart devices hackers hackfest hacking smart devices healthcare business protection against iot threats healthcare cyber security how can healthcare fight iot threats How Mirai botnet infects your device How Mirai works how retail can prevent cyber attacks how to exploit ble how to hack radio waves how to protect iot devices how to secure iot device IDA internet of things Internet of Things Security internet security ios application security ios security iot iot attacks iot bots, malwares iot device IoT Devices IoT Exploitation iot hacking iot hacks IoT hacks on ARM devices iot penetration testing iot pentest iot pentesting iot security IoT security guidelines iot security training iot threats iot threats to healthcare industry iotsecurity IP cameras jtag jtag debugging latest iot attacks learn ARM exploitation measures to prevent cyber attacks on healthcare organisations Mirai Botnet mirai history mobile app mobile application security mobile application security testing mobile security monitor iot devices Mozilla network security in retail ninja recon technique NIST offensive iot exploitation ola cabs owasp owasp appsec penetration testers penetration testing pentesting pentesting mobile apps phishing attacks powerofcommunity PrinterSecurity privacy protection profession professional qemu quizup radio communication protocol radio coomunication radio waves hacking recent ARM attacks recent cyber attacks recent iot attacks recent security camera attacks retail iot Reversing safety measures to protect privacy sdr secure coding guidelines security security cameras security challenges in retail IoT security in healthcare iot security issue security issues faced by e-retailers security services security training security vulnerability setup smart devices smart user security social networking spi steps to prevent iot attacks on healthcare surveillance cameras hijacked threat modeling tools to exploit ble training uart Understanding Mirai Botnet virus vulnerabilities discovered in popular IoT IP cameras vulnerabilities in internet connected cameras vulnerability vulnerable ARM devices What is mirai botnet? why choose career in cybersecurity writeups xposed hooking zigbee zigbee exploitation zigbee security zwave

Instagram