Snyk: Exploiting Open Source Code & Containerized Workloads on AWS with Snyk

Snyk: Exploiting Open Source Code & Containerized Workloads on AWS with Snyk

 ET
Online

Containers help you build and scale applications faster, but they can also introduce security risks.

In this hands-on live hacking session, we’ll exploit vulnerabilities in a containerized workload on AWS and remediate each attack scenario.

Join the hands-on session to:

  • Get an overview of common high severity open source and container vulnerabilities
  • Uncover and exploit vulnerabilities, including remote code execution and information disclosure
  • Remediate the vulnerabilities from each attack scenario
  • Learn how to detect container image vulnerabilities in popular registries like Amazon ECR and monitor Amazon EKS clusters for new vulnerabilities after deployment

By the end of the session you’ll have exploited and fixed two vulnerabilities and gained insights into best practices for securing your containerized workloads on AWS.