Program

Video records

You can access the records of the talks on our Youtube channel.

List of talks

Talks were chosen through our call for proposal process and the associated program committee, except keynotes selected by the organizing committee and rump sessions selected during the event.

Opening words
Sylvain Pasini (HEIG-VD, president of Black Alps)
[Keynote]
Unveiling the Express Lane to Catastrophe: Insights from Extensive Security Testing
Florian Badertscher (Bug Bounty Switzerland AG)
[Keynote]
Unleash the engineer within: Culture eats policy for breakfast
Fred Blaise (Thomson Reuters)
Needles in the Haystack: A Heuristics-based Approach to Vulnerability Discovery
Matt Hand (Prelude), Jack Ullrich (SpecterOps)
YouShallNotPass! Hardening CI/CD pipelines on mission critical environments
Pierre Dumont (Kudelski Security), Romain Aviolat (Kudelski Security)
XORtigate: zero-effort, zero-expense, 0-day on Fortinet SSL VPN
Charles Fol (Lexfo)
Ghidriff: Ghidra Binary Diffing Engine
John Mac (ClearSecLabs)
Quantum Computing Doomsday Planning: Is Your Organisation Ready?
JP Aumasson (Taurus), Farida Aclimandos (EPFL)
Sideloading Serenade: A Symphony of .NET Payload Techniques
Nick Powers (SpecterOps), Steven Flores (SpecterOps)
Caviar Scammers: The Sophisticated Operations of the SturgeonPhisher APT Group
Damien Schaeffer
Unraveling the Challenges of Reverse Engineering Flutter Applications
Axelle Apvrille (Fortinet)
A Security Research Journey: how the mobile industry met hackers in the middle
David Rogers MBE (Copper Horse Ltd), Roger Brown (GSMA)
Command-line Obfuscation Detection Using Large Language Models
Michael Adam Polak (Cisco), Vojtech Outrata (Cisco)
Cyber incident reportings : common obligations within organisations
Pauline Meyer (University of Lausanne), Sylvain Métille (University of Lausanne)
Defeating VPN Always-On
Maxime Clementz (PwC Luxembourg)
Infiltrating Kubernetes: A Comprehensive Study of Attack Scenarios and Security Measures
Magno Logan (Trend Micro)
Rump session
Several speakers

CFP and selection process

Call For Proposals

Talk selection process

A call for proposal (CFP) was organized. The program committee was in charge to select the talks (except the keynotes and rumps). The submission process is now closed (it was open until 10 June 2023).

Program committee

The program committee was composed of international renowned experts in the field. They were responsible for building a program of quality. They collected the proposals and selected the most outstanding ones.

  • Julien Bachmann, Google (chair)
  • Diane Dubois, Google
  • Alain Mowat, SCRT
  • Sylvain Pelissier, Kudelski Security
  • Christophe Tafani-Dereeper, Datadog
  • Mathieu Tarral, Intel

Proposal topics

We expected an event offering a wide range of topics ranging from software security to cyber security, data protection, technical and organizational aspects of software, hardware, networks, infrastructures, systems, and others. Topics could be:

  • Application security
  • Vulnerability research
  • Penetration testing and red teaming
  • Cloud security
  • Security automation
  • Network security
  • Intrusion detection and monitoring
  • Cryptography

Talks and speakers

Opening words

Opening words by Sylvain Pasini, president of the Black Alps association, and general chair of #BlackAlps23.

Photo of

Sylvain Pasini

Professor
HEIG-VD, president of Black Alps

Keynotes

[Keynote]
Unveiling the Express Lane to Catastrophe: Insights from Extensive Security Testing

A journey through the darkest corners of cybersecurity: buckle up as we explore the uncharted territories of digital disaster and unveil the most efficient and assured route to chaos – the Express Lane to Catastrophe.

Drawing from a database of thousands of systems and their security flaws, we've distilled the essence of vulnerability into a meticulously crafted roadmap of disaster. From unchecked privilege escalation to the subtle art of cryptographic misadventures, we're leaving no stone unturned, and no pitfall unexplored.

Through a careful examination of poor practices and unfortunate incidents, the goal is to provide a pragmatic view of the vulnerability landscape. Equipped with this knowledge, you will be better prepared to proactively identify and address vulnerabilities, reinforcing your defenses and making well-informed decisions to avert potential disasters.

Photo of

Florian Badertscher

Co-Founder & CTO
Bug Bounty Switzerland AG

[Keynote]
Unleash the engineer within: Culture eats policy for breakfast

In a world dominated by API-driven technologies where boundaries no longer exist but in certain leaders' minds, we have to rethink how we build and operate our (product) security organizations. A scaling factor to lower the attack surface is to empower our engineering workforce to adopt security by design and by default paradigms. There is work to be done on both sides of the fence, yet let's start by challenging how security is perceived and done: Unleash the engineer within, innovate, cultivate empathy and leave the old security mindset behind.

We will explore how fostering a security engineering culture, enabling strong partnerships, trust and accountability can put us on a path to better protect ourselves against pernicious classes of attacks, such as ones targeting our software supply chain or AI models.

Walking away from this session, you will gain several actionable insights to add to your own strategy, from leadership style and softer skills, key partnerships, process improvement advice and technical integration clues.

Ready to challenge yourself and the status quo?

Photo of

Fred Blaise

Sr Director, Product Security
Thomson Reuters

Conferences

Needles in the Haystack: A Heuristics-based Approach to Vulnerability Discovery

What happens if you compromise a host in the target environment and all of your common tradecraft is no longer viable due to system hardening and patching? The ability to discover, triage, and exploit vulnerabilities on red team operations has become a critical skill set, especially for those targeting mature organizations. It opens many new avenues to build attack paths that otherwise would not be available with common techniques. Discovering new exploitable vulnerabilities on Windows systems, however, can be a daunting task. Many view it as a process that requires an immense amount of time, skill, and often plain old luck. Because of how critical this skillset is to our operations, we have invested an immense amount of time into honing our approach for identifying vulnerabilities that we can quickly leverage while constrained by time. This approach has continuously yielded exploitable vulnerabilities in both commercial and consumer applications in modern versions of Windows, primarily facilitating local privilege escalation (LPE) and remote code execution (RCE), but also providing novel methods of persistence and initial access. In this talk, we will share our heuristics for quickly triaging a host to identify potential vulnerabilities, discuss the common bug classes that we are hunting for, walk through their exploitation, and provide case studies of vulnerabilities that we’ve found on real world operations. After attending this talk, the audience will understand how to optimize their own vulnerability research process and how to exploit some of the most prevalent vulnerabilities we see in our work.

Photo of

Matt Hand

Principal Security Engineer
Prelude

Matt Hand is an experienced red team operator with over a decade of experience. His primary areas of focus are in vulnerability research and EDR evasion where he spends a large amount of time conducting independent research, developing tooling, and publishing content. Matt is currently a Principal Security Engineer at Prelude where he is helping build their continuous security testing platform, Detect, and serving as the subject matter expert on EDR, offensive tradecraft, reverse engineering, and Windows internals.
Photo of

Jack Ullrich

Consultant
SpecterOps

YouShallNotPass! Hardening CI/CD pipelines on mission critical environments

In this presentation, we will explore the issue of securing CI/CD pipelines targeting mission-critical systems.

We'll begin by providing an overview and the benefits of CI/CD pipelines, before delving into the specifics of GitLab's CI/CD capabilities, including the role of "Runners" in executing jobs and pipelines.

Given the increasing number of security risks associated with CI/CD pipelines and the threat actors trying to exploit them, a MITRE ATT&CK style matrix will be used to highlight these risks and underscore the importance of proper security measures.

Next, the concept of a custom Runner executor will be introduced and its potential in enhancing pipeline security will be discussed. We will describe our own implementation of a custom executor “YouShallNotPass”, outlining the tools and technologies we used to ensure that only trusted images and users can run code in the repository.

Finally, several use-cases will be provided to demonstrate how the custom executor can be deployed in diverse environments to boost pipeline security.

In conclusion, our presentation will emphasize the benefits of utilizing CI/CD platforms to deploy configuration or code on critical systems, the potential security risks associated with them, and our solution by implementing a custom executor to improve their overall security.

Photo of

Pierre Dumont

Cybersecurity Architect
Kudelski Security

Pierre is a Cybersecurity Architect at Kudelski Security (Switzerland) and has worked there in various roles since November 2017. As part of the Product department, he defines and leads the technical implementation of new Kudelski Security offerings. He earned a master’s degree after studying at ETHZ in Electrical Engineering and Information Technology and a bachelor’s degree from EPFL in Communication Systems.
Photo of

Romain Aviolat

Principal Cloud & Security Engineer
Kudelski Security

Romain is a seasoned cybersecurity professional, holds the position of Associate CISO at Kudelski Security. As a dedicated Blue Teamer, he orchestrates the organization's security strategies, specializing in application security, cloud security, and comprehensive Zero Trust / D3fend security architecture.

XORtigate: zero-effort, zero-expense, 0-day on Fortinet SSL VPN

While performing a red team assessment, due to limited scope, we were forced to look for 0-day vulnerabilities on a Fortinet appliance. This talk describes how we found and exploited CVE-2023-27997, a pre-authentication remote code execution vulnerability affecting the VPN interface of Fortigate, affecting hundred of thousands of servers on the internet, and used it to completely compromise the company' intranet. It will cover the vulnerability research process from start to finish, starting from how to get a shell on a local appliance, our research logic, the bug and the exploit, and finally how to persist on the target despite reboots.

Photo of

Charles Fol

Security Researcher
Lexfo

Charles Fol, also known as cfreal, is a security researcher at LEXFO / AMBIONICS. He has discovered remote code execution vulnerabilities targeting renowned CMS and frameworks such as Drupal, Magento, Symfony or Laravel, but also enjoys binary exploitation, to escalate privileges (Apache, PHP-FPM) or compromise security solutions (DataDog’s Sqreen, Fortinet SSL VPN, Watchguard). He is the creator for PHPGGC, the go-to tool to exploit PHP deserialization.

Ghidriff: Ghidra Binary Diffing Engine

This talk presents `ghidriff`, a new open-source Python package that offers a command line binary diffing capability leveraging the power of Ghidra with a fresh take on the standard patch diffing workflow.

As seen in most security blog posts today, binary diffing tools are essential for reverse engineering, vulnerability research, and malware analysis as they identify added, deleted, and modified functions between two binaries. Matching functions across binaries is a challenging and asymmetric problem because of complex function relationships and the many changes that can occur after a simple change is introduced into the source of a binary. `ghidriff` overcomes this challenge by offering the latest function matching heuristics while also providing the user the ability to extend it with custom function correlation classes. Like other binary diffing solutions, the tool stands on the shoulders of giants (SRE tooling) to interpret a binary and provide a consistent and reliable approach to binary diffing. Unlike other tools, `ghidriff` offers a command line experience, simplifying the entire patch diffing workflow to only a single step, significantly reducing analysis time. Additionally, the results of the diff are rendered as beautiful markdown files that can be shared and hosted almost anywhere.

`ghidriff` is the open source tool security researchers need to quickly understand the latest patched vulnerabilities and easily share their next vulnerability writeup with the security community.

Photo of

John Mac

Researcher
ClearSecLabs

A security researcher @clearseclabs who is passionate about learning and sharing knowledge on various aspects of information security. He has a keen interest in binary analysis, patch diffing, and vulnerability discovery. He is the creator of several open-source security and InfoSec tools and also blogs regularly about his research projects and experiments with Ghidra and Jupyter Notebooks. You can follow him on Twitter @clearbluejar or visit his website https://clearbluejar.github.io.

Quantum Computing Doomsday Planning: Is Your Organisation Ready?

Quantum computing is often portrayed as an imminent threat, but what exactly is it all about? This presentation is designed for a wide audience of security professionals, and aims to address the most important questions.

We will first introduce the concept of quantum computing, describing the key notions of quantum speed-up and quantum parallelism, as well as the notions of universal computation, scalability, and quantum error correction.

We will then give an overview of quantum computing research, describing the leading companies in the space and their main achievements, such as factoring the number 15 into 3×5 (with high probability). We'll explain the difference between real quantum computing and simulated quantum computing, which is not always made very clear by the vendors.

We will explore the various ways in which quantum computing could impact TLS connections, VPN services, secure messaging, 4G/5G communications, database encryption, and blockchain platforms. This information aims to assist the audience in understanding how to manage risks differently for distinct applications.

Additionally, we will offer guidance on conducting and documenting a risk assessment for your organisation or clientele. Lastly, we will outline practical options for transitioning to post-quantum cryptography by examining the post-quantum offerings of technology companies, including cloud service providers, VPN service providers, and hardware manufacturers.

This presentation does not necessitate any prior knowledge of quantum physics or quantum mechanics, and may even include adorable kitten images

Photo of

JP Aumasson

CSO
Taurus

Photo of

Farida Aclimandos

Student
EPFL

Sideloading Serenade: A Symphony of .NET Payload Techniques

Achieving execution of your payloads in typical phishing or red-team scenarios, without being outright prevented, is a constantly moving goal post. It can be almost as frustrating as when you finally develop a payload that meets your needs, only for it to be prevented by a brittle detection logic soon thereafter - leaving you to start from square one.

In this talk, we will cover a variety of core principals we apply to our .NET payloads to increase longevity and effectiveness while decreasing burden associated with development and the build process. Topics spanning entropy-conscious obfuscation, runtime protection techniques, dynamic delivery of encryption keys, polymorphic build automation, and more will be covered. We will discuss additional options the .NET framework gives us for sideloading trusted .NET assemblies, to compliment more traditional sideloading techniques. Creating a repository of preferred techniques regarding shellcode injection and other important components of your payload will be discussed, as well as an approach for selecting from your collection of techniques for a plug n' play experience during the build process to best fit your offensive use-case. Finally, we will demonstrate how all of the concepts can be directly applied to payloads that fit a variety of use-cases: initial access, lateral movement, and more.

We hope to demonstrate that following a handful of OPSEC considerations, combined with the added trust of sideloading existing .NET assemblies, can ease the burden and lower the barrier to entry for effective .NET payload development.

Photo of

Nick Powers

Service Architect
SpecterOps

Nick is a senior consultant on the adversary simulation team at SpecterOps. He has experience with providing, as well as leading, red team and pentest service offerings for a large number of fortune 500 companies. Nick has previously presented at Defcon, Wild West Hacking Fest, and instructed training at Blackhat. With a career focused on offensive security, a few of his interests and prior research focuses have included initial access techniques, evasive Windows code execution, and targeted cross-protocol relay of NTLM authentication.
Photo of

Steven Flores

Service Architect
SpecterOps

Caviar Scammers: The Sophisticated Operations of the SturgeonPhisher APT Group

SturgeonPhisher, also known as YoroTrooper, is a cyberespionage group active since at least October 2021. The group focuses on spearphishing and webmail-credential stealing. It targets government officials, think-tanks, and employees of state-owned companies in countries bordering the Caspian Sea – the Russian Federation being one of the most targeted countries.

SturgeonPhisher’s activities are not limited to credentials stealing, they also use a recently updated arsenal including some reverse shells, password stealers, remote access trojans (like RustyRAT), and a Telegram backdoor as a way of performing espionage campaigns on selected targets. In order to deliver their malicious payloads, we observed the compromission of legitimate websites in addition to traditional spearphishing.

In their phishing operations, this threat actor registered many domains similar to the legitimate ones used by the targeted entities and hosted a copy of the target website. The initial attack vector in their espionage campaigns is mostly spearphishing emails with an attachment.

In this presentation, we will describe a few typical compromise chains with some examples of phishing websites and analysis of multi-stage malware. For now, we have made no attribution of the group’s origin, but it is likely that it is operated from a Central Asian country, given the operating time zone and narrow targeting.

Photo of

Damien Schaeffer

Damien works as a Senior Malware Researcher at ESET, where he has specialized in targeted attack research. With a primary focus on APT, his main duties include hunting and reverse engineering of the latest threats. As a background, he holds an M.Sc. in Computer Science and previously worked in incident response, cyber threat intelligence, and malware analysis.

Unraveling the Challenges of Reverse Engineering Flutter Applications

Flutter, a popular cross-platform application development kit developed by Google, utilizes the Dart programming language. Dart is an object-oriented programming language with a C-style syntax and features like sound null safety. One of Flutter's key attractions is its ability to develop applications with a single codebase, which can be compiled for various mobile and non-mobile platforms.

While Flutter debug applications pose no difficulty to reverse, release applications are totally different: a nightmare. The challenges arise from several design choices: including default code obfuscation, the utilization of a virtual machine (VM), an evolving and undocumented executable format (Dart AOT snapshot), indirect access to objects and constants, dedicated registers, unique representation of Small Integers (SMI) and non-standard calling conventions.

In this talk, we delve into these challenges and provide techniques and analysis to overcome them. The centerpiece of the talk is a practical demonstration of reversing a Flutter CrackMe app. Initially, even strings remain elusive, and many disassemblers are completely lost. We work our way through the identification of significant functions, encryption loops, access to constants and disassembly of byte arrays. To accomplish this, we navigate between the code in the Dart SDK repository, Dart programs and the Flutter crackme app. We discover that Radare2 excels in recognizing function names (for Dart) and offering insightful assembly comments. JEB disassembler, on the other hand, proves invaluable in recovering the Object Pool, a Dart structure which provides access to objects and constants.

Photo of

Axelle Apvrille

Principal Security Researcher
Fortinet

Axelle Apvrille is a Principal Security Researcher at Fortinet, Fortiguard Labs. Her research interests are mobile and IoT malware. In addition, she is the lead organizer of Ph0wn CTF, a competition which focuses on ethical hacking of smart objects. In a prior life, Axelle used to implement cryptographic algorithms and security protocols.

A Security Research Journey: how the mobile industry met hackers in the middle

The mobile industry has always had a relationship with the hacking community and it has often been collaborative when it comes to protecting consumers.

This is the first time that the mobile industry has spoken about its work with the security research community which started with very informal relationships with hackers and developed into the world’s first cross-industry Coordinated Vulnerability Disclosure (CVD) scheme. The scheme that has run since 2017 has had 70 submissions affecting technologies used by the entire mobile industry. The resulting fixes have saved end users from major pain through the avoided exploitation of the disclosed vulnerabilities.

The speaker will take the audience on a journey through mobile hacking history from the industry’s point of view. Highlights include SS7 signalling attacks and rogue base stations through to femtocell hacks, LTE network breaches and lots of clever device hacking as well as some legendary names from the hacking world. The talk will focus on the technical details of the hacks, how we were able to address them as an industry; what went wrong and what we learnt along the way. The talk will also look at where we can go together in the future and what types of technology challenges and issues we expect to see.

Photo of

David Rogers MBE

GSMA Fraud and Security Group (FASG) Chair, CEO Copper Horse
Copper Horse Ltd

David is a mobile phone and IoT security specialist who runs Copper Horse Ltd, a software and security company based in Windsor, UK. His company is currently focusing on product security for the Internet of Things as well as future automotive cyber security. David chairs the Fraud and Security Group at the GSMA. He authored the UK’s ‘Code of Practice for Consumer IoT Security’, in collaboration with UK government and industry colleagues and is a member of the UK’s Telecoms Supply Chain Diversification Advisory Council. David holds an MSc in Software Engineering from the University of Oxford and a HND in Mechatronics from the University of Teesside. He lectured in Mobile Systems Security at the University of Oxford from 2012-2019 and served as a Visiting Professor in Cyber Security and Digital Forensics at York St John University. He has spoken at a number of hacking conferences on his security research work including DEF CON’s Car Hacking Village, 44CON, B-Sides London, B-Sides Cymru and B-Sides LV. He was awarded an MBE for services to Cyber Security in the Queen’s Birthday Honours 2019.
Photo of

Roger Brown

Security services manager
GSMA

Command-line Obfuscation Detection Using Large Language Models

Command-line obfuscation is one of the most common methods adversaries use to avoid detection. These methods include changing the case of letters in the paths to binaries, adding symbols that are ignored by the command-line interpreter, using homoglyphs or storing the arguments in variables and re-ordering them on the command-line, etc. Most security solutions use signatures to detect state-of-the-art malware requiring threat analysts to create an exhaustive enumeration of signatures for obfuscation techniques. Instead of signatures, we utilize an NLP approach that can generalize and detect previously unseen obfuscation techniques.

The proposed NLP method consists of two components, a tokenizer and a classifier. The tokenizer augments the command lines and transforms them into a low-dimensional representation without losing information about the underlying obfuscation technique. Since the command line has a different structure than natural language, the pre-trained classification model is fine-tuned on samples observed in the wild.

The experiments demonstrate that the approach yields high precision and recall with a small number of false positives. Additionally, it uncovered new hard-to-detect obfuscation techniques that rely on pre-installed software on the operating system. The novel detections include new strains of the Raspberry Robin worm on Windows 11 that use a highly obfuscated execution of wt.exe or Gamarue that uses rundll32.exe to execute its obfuscated payload.

Photo of

Michael Adam Polak

Data scientist
Cisco

Photo of

Vojtech Outrata

Data scientist
Cisco

Cyber incident reportings : common obligations within organisations

Cyber incidents, cyber-attacks and vulnerabilities are issues that affect everyone working in organisations. Their occurrence triggers various processes, including legal processes, especially in the form of obligations. These obligations include reporting obligations to various external bodies, sometimes in order to remedy a harmful event or to comply with its obligations and enable the authorities to carry out their duties.

The talk will address the main reporting obligations for organisations active in Switzerland and their modalities. The main reporting obligations in Switzerland are the reporting obligation cyber-attacks on critical infrastructures and the reporting obligation of personal data breaches. The talk will consist in sharing what they entail and briefly looking at other obligations that may be parallel, in order for the audience to understand what exists in Switzerland, how every person in an organisation can help on its own scale help the organisation to manage legal duties and how the conformity to these obligations can help to increase organisations’ resilience.

A presentation such as this is important to enable the various people involved in organisations 1) to understand the issues at stake in terms of information flows, 2) to be aware of everyone’s obligations (e.g. in terms of documentation and information sharing), 3) to improve exchanges and understanding between different professions, and to increase trust and resilience of organisations.

Photo of

Pauline Meyer

PhD candidate
University of Lausanne

Pauline Meyer undertakes a PhD in Law at the University of Lausanne in the context of an NRP-77 project “Promoting trust in cybersecurity through ethics and law”. The PhD addresses cybersecurity by critical infrastructures under Swiss law. Her areas of specialisation include cybersecurity, cybercrime and data protection. Also research and teaching assistant at the University of Lausanne, she has worked for the Data Protection & Right to Information Authority of canton de Vaud and is now involved in various associations alongside her PhD.
Photo of

Sylvain Métille

Associate Professor
University of Lausanne

Sylvain Métille is an Associate Professor at Lausanne University and the director of the Master of Law (MLaw) in Legal Issues, Crime and Security of Information Technologies. He teaches Data Protection and Computer Crime. He is also a Partner at the law firm HDC in Lausanne (Switzerland). He obtained his J.D (2003) and PhD in Law with Honors (summa cum laude, 2010) at the University of Neuchâtel. Admitted to the Swiss Bar in 2005, he gained a solid experience within several law firms. He has been invited as a Visiting Scholar by the Berkeley Center for Law and Technology (University of California) in 2010-2011. He is recently called as an expert by the Swiss Parliament, the Council of Europe and the European Parliament.

Defeating VPN Always-On

VPN Always-On is a security control that can be deployed to mobile endpoints that remotely access corporate resources through VPN. It is designed to prevent data leaks and narrow attack surface of enrolled end-user equipment connected to untrusted networks. When it is enforced, the mobile device can only reach the VPN gateway and all connections are tunnelled.

We will review the relevant Windows API, the practicalities of this feature, look at popular VPN software and... bypass them with ridiculously complex exfil methods but also with unexpectedly trivial tricks. We will exploit design, implementation and configurations issues to circumvent this control in offensive scenarios. We will then learn how to fix or harden VPN Always-On deployment to further limit the risks posed by untrusted networks.

This talk is more than just the outcome of my technical research against one particular network security feature. It is an attempt to fully embrace the hacker spirit through the revolt against Control, the unreasonable time trying to understand the technological subtleties and finally the sharing of beautifully simple techniques to break free.

This original research has outcome that will give security practitioners (blue & red) tangible ways to attack & defend in the context of corporate VPN setups. I am not a security researcher but I would like to share my experience on this topic after years of penetration tests and red-teaming in mature environments.

Photo of

Maxime Clementz

CSIRT Leader - Senior Manager
PwC Luxembourg

Maxime Clementz is a Senior Manager within the Cybersecurity Advisory team of PwC Luxembourg. He develops his ethical hacker skills by committing himself to various assignments for big companies, banks and European institutions. As a technical specialist, he leads penetration tests, red-teaming, digital forensics and incident response missions. He contributes to the development of the team’s hacking capabilities by sharing the results of his technology watch and R&D and is now leading the CSIRT and Threat Intelligence initiatives of PwC Luxembourg. He especially enjoys sharing knowledge by presenting the results of each mission or by giving talks (Hack.lu 2012, 2015, 2017) and training courses. Maxime teaches IT security at a French engineering school and organizes a Capture the Flag event for the students.

Infiltrating Kubernetes: A Comprehensive Study of Attack Scenarios and Security Measures

Kubernetes (K8s) is a leading container orchestration platform, and it has revolutionized how we build, deploy, and manage containerized applications. However, with great powers comes great responsibilities. This research uncovers attackers' methods to infiltrate and remain undetected in a compromised K8s cluster.

Using real-world applications as examples, we delve into the various tactics, techniques, and procedures (TTPs) that attackers or malicious users can leverage to exploit your K8s cluster. A detailed examination of an attack scenario starts from the initial compromise of a pod. We illustrate many strategies to escalate privileges, from exploiting misconfigurations to leveraging software vulnerabilities. Subsequently, we analyze the steps involved in container escape, which enables an attacker to access the underlying node, effectively breaching the host. Furthermore, our analysis includes studying stealth techniques that allow attackers to remain undetected within your K8s cluster. Using sidecar containers, attackers can mask their activities and maintain persistence within the environment. We illustrate how such an attacker could escalate their privileges to eventually become a K8s cluster administrator, thus gaining complete control of the victim's environment.

Despite the grim picture painted by these potential attack vectors, we demonstrate that proactive detection and response strategies can significantly mitigate these risks. Using K8s' built-in security features and audit logs, we provide insights into identifying potential indicators of compromise (IoCs). As part of our mitigation strategies, we explore using runtime security tools such as Falco. Falco enables creating and deploying of rules that detect abnormal behavior within your K8s cluster. By detailing the implementation of such rules, we provide a robust guide to enhance the detection of and response to a broad array of potential attacks. The research aims to enhance the understanding of potential threats facing a Kubernetes environment and offers comprehensive guidelines on securing the K8s cluster. Understanding an attacker's modus operandi and the appropriate defense mechanisms are integral to maintaining a secure environment in the contemporary landscape of containerized applications and microservices.

Photo of

Magno Logan

Security Researcher
Trend Micro

As an Information Security Specialist, Magno Logan specializes in various subjects, including Cloud, Container, Application Security Research, Threat Modeling, and Kubernetes Security. He boasts multiple international certifications and is a sought-after speaker at worldwide security conferences, presenting in countries such as Canada, the US, Brazil, and Europe. In addition to his professional accomplishments, Magno is the founder of the JampaSec Security Conference and the OWASP Paraiba Chapter. He has previously served as a Snyk Ambassador and member of the CNCF Security TAG, Kubernetes SIG Security, and OpenSSF.

Rump session

Participants can propose short talks. Please send your talk to in pdf format

Photo of

Several speakers