We're sorry but this page doesn't work properly without JavaScript enabled. Please enable it to continue.
Feedback

All Roads Lead to GKEs Host: 4+ Ways to Escape

00:00

Formal Metadata

Title
All Roads Lead to GKEs Host: 4+ Ways to Escape
Title of Series
Number of Parts
Author
License
CC Attribution 3.0 Unported:
You are free to use, adapt and copy, distribute and transmit the work or content in adapted or unchanged form for any legal purpose as long as the work is attributed to the author in the manner specified by the author or licensor.
Identifiers
Publisher
Release Date
Language

Content Metadata

Subject Area
Genre
Abstract
Container security is a prevalent topic in security research. Due to the great design and long-term effort, containers have been more and more secure. Usage of container technology is increasingly being used. Container security is a topic that has started to be discussed a lot lately. In late 2021, Google increased the vulnerability reward program in kCTF infrastructure, which was built on top of Kubernetes and Google Container Optimized OS, with a minimum reward of $31,337 per submission. In this talk, we will share about how we managed to have 4 successful submissions on kCTF VRP by exploiting four Linux kernel bugs to perform container escape on kCTF cluster, we will explain some interesting kernel exploit techniques and tricks that can be used to bypass the latest security mitigation in Linux kernel. We will also share what we did wrong that causes us to nearly lose 1 of the bounty. As of writing, there are 14 successful entries to kCTF. In this presentation, we are willing to share our full, in-depth details on the research of kCTF. To the best of our knowledge, this presentation will be the first to talk about a complete methodology to pwn kCTF (find and exploit bugs within 0-day and 1-day) in public.
String (computer science)Kernel (computing)Local ringParsingParameter (computer programming)Physical systemVulnerability (computing)DatabaseState diagramInformationRevision controlComputer engineeringSoftwareKernel (computing)Vulnerability (computing)FlagMereologyInternetworkingSingle-precision floating-point formatInformation securityDifferent (Kate Ryan album)Right angleExploit (computer security)Computer architectureSoftware bugIntegrated development environmentVirtualizationSurfaceGraph coloringPoint cloudStreaming mediaMultiplication signKey (cryptography)Address spaceString (computer science)Computer fileType theoryGroup actionFeedbackPresentation of a groupFile systemEscape characterFunctional (mathematics)Computer fontGame controllerBus (computing)Content (media)Computer programmingBitLimit (category theory)System callConfiguration spaceNetwork socketBefehlsprozessorOperator (mathematics)SynchronizationInterface (computing)Default (computer science)File formatData managementRevision controlSource codeEmailModule (mathematics)Procedural programmingRun time (program lifecycle phase)Context awarenessPhysical systemWeightGastropod shellParallel portBuildingSoftwareInstallation artNamespaceRead-only memoryFrame problemInsertion lossBackdoor (computing)CodeRootTablet computerComputer animation
Gamma functionCone penetration testProcess (computing)Source codeStrategy gameExploit (computer security)Menu (computing)StrutInformation securityGame theoryObject (grammar)Category of beingWeb pageRight angleMedical imagingCache (computing)Resource allocationBuffer overflowType theoryMemory management2 (number)Primitive (album)EmailMultiplication signProcess (computing)HexagonComputer fileMessage passingTotal S.A.Different (Kate Ryan album)Set (mathematics)Software bugInterface (computing)Functional (mathematics)Selectivity (electronic)Kernel (computing)Pointer (computer programming)WritingReading (process)Queue (abstract data type)Parameter (computer programming)Function (mathematics)FreewareMultiplicationCloningContext awarenessExploit (computer security)Source codeInformationLogic gateComputer animation
Content (media)Convex hullInformation securityQueue (abstract data type)LeakControl flowWeb pageStrategy gameExploit (computer security)Buffer solutionContext awarenessMessage passingQueue (abstract data type)FreewareSoftware bugProcess (computing)Object (grammar)Radical (chemistry)Bound stateConfiguration spaceFlagField (computer science)Electronic mailing listTotal S.A.Kernel (computing)Set (mathematics)Insertion lossHexagonEmailMemory managementException handlingFunctional (mathematics)Latent heatSource codeGame controllerInformation retrievalSystem callAddress spaceReading (process)Operator (mathematics)Link (knot theory)Pointer (computer programming)RippingComputer fileInformation securitySummierbarkeitMedical imagingSelectivity (electronic)Cache (computing)Strategy gameDoubling the cubeLeakProof theoryComputer animation
Information securityStrategy gameExploit (computer security)Web pageQuiltComputer configurationComputer engineeringMemory managementInformationSystem callRevision controlKernel (computing)SoftwareResource allocationMenu (computing)Control flowGamma functionMaizeExecution unitDemo (music)Insertion lossObject (grammar)Game controllerExploit (computer security)Resource allocationBuffer solutionAddress spaceOpen setCASE <Informatik>Network socketRevision controlLevel (video gaming)Block (periodic table)Variable (mathematics)Kernel (computing)FreewareSet (mathematics)Functional (mathematics)Bound statePointer (computer programming)Content (media)ChainStack (abstract data type)Process (computing)Gastropod shellFlagRootNamespaceLoop (music)Uniform resource locatorReading (process)Operator (mathematics)HoaxCodeSoftware bugCausalityState of matterField (computer science)Information securityInstance (computer science)Data typeDoubling the cubeSystem callLeakPrincipal ideal domainWeb pageComputer-assisted translationLimit (category theory)Cache (computing)RippingComputer animation
Computer wormFlagCellular automatonComputer engineeringInformationMemory managementSoftwareRevision controlFunction (mathematics)Data bufferContext awarenessFile systemKernel (computing)Parameter (computer programming)Computer fileLocal ringPhysical systemVulnerability (computing)DatabaseIntegerBound stateCache (computing)Strategy gameExploit (computer security)Gastropod shellRootMemory managementData structurePhysical systemIntegerFile systemContext awarenessMessage passingVulnerability (computing)Buffer overflowData bufferRippingKernel (computing)MathematicsQueue (abstract data type)Information securityBuffer solutionBoundary value problemCASE <Informatik>Descriptive statisticsMultiplication signCausalityModule (mathematics)FreewareTrailPoint (geometry)Address spaceCache (computing)Reading (process)Order (biology)System callEscape characterDemo (music)Electronic mailing listContent (media)Function (mathematics)MiniDiscSoftware testingLeakCore dumpSpring (hydrology)Traffic reportingWeb pageComputer animation
LengthComputer wormMemory managementInformationSoftwareRevision controlLocal ringIntegerVulnerability (computing)Kernel (computing)Buffer overflowDatabaseInternet forumEvent horizonElectric currentStrategy gameExploit (computer security)Game theoryWorld Wide Web ConsortiumSystem callFunktionspunktmethodeData structureRule of inferencePoint (geometry)Key (cryptography)FreewareKernel (computing)Multiplication signBuffer overflowOcean currentOperator (mathematics)Message passingDescriptive statisticsGame controllerCausalityDemo (music)Memory managementContent (media)Vulnerability (computing)Computer wormOrder (biology)Directory serviceRippingAddress spaceNear-ringVideoconferencingIntegerResource allocationReading (process)Ring (mathematics)Cache (computing)Core dumpCodePointer (computer programming)Row (database)Information securityPhysical systemSpring (hydrology)Functional (mathematics)Computer animation
Demo (music)Sign (mathematics)Exploit (computer security)Vulnerability (computing)GoogolMessage passingBulletin board systemEscape characterMathematicsComputer programmingLimit (category theory)Information securitySoftware bugScaling (geometry)Projective planeComputer animation
Transcript: Englisch(auto-generated)