Something of The Book

PDF EPUB Library of e-Books

Hacking Kubernetes

Hacking Kubernetes

Author: Andrew Martin

Publisher: "O'Reilly Media, Inc."

ISBN: 9781492081685

Category: Computers

Page: 314

View: 677

Download BOOK »
Want to run your Kubernetes workloads safely and securely? This practical book provides a threat-based guide to Kubernetes security. Each chapter examines a particular component's architecture and potential default settings and then reviews existing high-profile attacks and historical Common Vulnerabilities and Exposures (CVEs). Authors Andrew Martin and Michael Hausenblas share best-practice configuration to help you harden clusters from possible angles of attack. This book begins with a vanilla Kubernetes installation with built-in defaults. You'll examine an abstract threat model of a distributed system running arbitrary workloads, and then progress to a detailed assessment of each component of a secure Kubernetes system. Understand where your Kubernetes system is vulnerable with threat modelling techniques Focus on pods, from configurations to attacks and defenses Secure your cluster and workload traffic Define and enforce policy with RBAC, OPA, and Kyverno Dive deep into sandboxing and isolation techniques Learn how to detect and mitigate supply chain attacks Explore filesystems, volumes, and sensitive information at rest Discover what can go wrong when running multitenant workloads in a cluster Learn what you can do if someone breaks in despite you having controls in place

Networking and Kubernetes

Networking and Kubernetes

Author: James Strong

Publisher: "O'Reilly Media, Inc."

ISBN: 9781492081609

Category: Computers

Page: 340

View: 393

Download BOOK »
Kubernetes has become an essential part of the daily work for most system, network, and cluster administrators today. But to work effectively together on a production-scale Kubernetes system, they must be able to speak the same language. This book provides a clear guide to the layers of complexity and abstraction that come with running a Kubernetes network. Authors James Strong and Vallery Lancey bring you up to speed on the intricacies that Kubernetes has to offer for large container deployments. If you're to be effective in troubleshooting and maintaining a production cluster, you need to be well versed in the abstraction provided at each layer. This practical book shows you how. Learn the Kubernetes networking model Choose the best interface for your clusters from the CNCF Container Network Interface project Explore the networking and Linux primitives that power Kubernetes Quickly troubleshoot networking issues and prevent downtime Examine cloud networking and Kubernetes using the three major providers: Amazon Web Services, Google Cloud, and Microsoft Azure Learn the pros and cons of various network tools--and how to select the best ones for your stack

How to Hack Like a Ghost

How to Hack Like a Ghost

Author: Sparc Flow

Publisher: No Starch Press

ISBN: 9781718501270

Category: Computers

Page: 264

View: 643

Download BOOK »
How to Hack Like a Ghost takes you deep inside the mind of a hacker as you carry out a fictionalized attack against a tech company, teaching cutting-edge hacking techniques along the way. Go deep into the mind of a master hacker as he breaks into a hostile, cloud-based security environment. Sparc Flow invites you to shadow him every step of the way, from recon to infiltration, as you hack a shady, data-driven political consulting firm. While the target is fictional, the corporation’s vulnerabilities are based on real-life weaknesses in today’s advanced cybersecurity defense systems. You’ll experience all the thrills, frustrations, dead-ends, and eureka moments of his mission first-hand, while picking up practical, cutting-edge techniques for penetrating cloud technologies. There are no do-overs for hackers, so your training starts with basic OpSec procedures, using an ephemeral OS, Tor, bouncing servers, and detailed code to build an anonymous, replaceable hacking infrastructure guaranteed to avoid detection. From there, you’ll examine some effective recon techniques, develop tools from scratch, and deconstruct low-level features in common systems to gain access to the target. Spark Flow’s clever insights, witty reasoning, and stealth maneuvers teach you how to think on your toes and adapt his skills to your own hacking tasks. You'll learn: • How to set up and use an array of disposable machines that can renew in a matter of seconds to change your internet footprint • How to do effective recon, like harvesting hidden domains and taking advantage of DevOps automation systems to trawl for credentials • How to look inside and gain access to AWS’s storage systems • How cloud security systems like Kubernetes work, and how to hack them • Dynamic techniques for escalating privileges Packed with interesting tricks, ingenious tips, and links to external resources, this fast-paced, hands-on guide to penetrating modern cloud systems will help hackers of all stripes succeed on their next adventure.

Core Kubernetes

Core Kubernetes

Author: Jay Vyas

Publisher: Simon and Schuster

ISBN: 9781617297557

Category: Computers

Page: 334

View: 656

Download BOOK »
Take a deep dive into Kubernetes inner components and discover what really powers a Kubernetes cluster. This in-depth guide shines a light on Kubernetes' murky internals, to help you better plan cloud native architectures and ensure the reliability of your systems. To build and operate reliable Kubernetes-based systems, you need to understand what's going on below the surface. Core Kubernetes is an in-depth guide to Kubernetes' internal workings written by Kubernetes contributors Chris Love and Jay Vyas. It's packed with experience-driven insights and advanced techniques you won't find anywhere else. You'll understand the unique security concerns of container-based applications, minimize costly unused capacity, and get pro tips for maximizing performance. Diagrams, labs, and hands-on examples ensure that the complex ideas are easy to understand and practical to apply.

Hands-On Kubernetes on Windows

Hands-On Kubernetes on Windows

Author: Piotr Tylenda

Publisher: Packt Publishing Ltd

ISBN: 9781838825997

Category: Computers

Page: 592

View: 258

Download BOOK »
Build and deploy scalable cloud applications using Windows containers and Kubernetes Key FeaturesRun, deploy, and orchestrate containers on the Windows platform with this Kubernetes bookUse Microsoft SQL Server 2019 as a data store to deploy Kubernetes applications written in .NET FrameworkSet up a Kubernetes development environment and deploy clusters with Windows Server 2019 nodesBook Description With the adoption of Windows containers in Kubernetes, you can now fully leverage the flexibility and robustness of the Kubernetes container orchestration system in the Windows ecosystem. This support will enable you to create new Windows applications and migrate existing ones to the cloud-native stack with the same ease as for Linux-oriented cloud applications. This practical guide takes you through the key concepts involved in packaging Windows-distributed applications into containers and orchestrating these using Kubernetes. You'll also understand the current limitations of Windows support in Kubernetes. As you advance, you'll gain hands-on experience deploying a fully functional hybrid Linux/Windows Kubernetes cluster for development, and explore production scenarios in on-premises and cloud environments, such as Microsoft Azure Kubernetes Service. By the end of this book, you'll be well-versed with containerization, microservices architecture, and the critical considerations for running Kubernetes in production environments successfully. What you will learnUnderstand containerization as a packaging format for applicationsCreate a development environment for Kubernetes on WindowsGrasp the key architectural concepts in KubernetesDiscover the current limitations of Kubernetes on the Windows platformProvision and interact with a Kubernetes cluster from a Windows machineCreate hybrid Windows Kubernetes clusters in on-premises and cloud environmentsWho this book is for This book is for software developers, system administrators, DevOps engineers, and architects working with Kubernetes on Windows, Windows Server 2019, and Windows containers. Knowledge of Kubernetes as well as the Linux environment will help you get the most out of this book.

Kubernetes – An Enterprise Guide

Kubernetes – An Enterprise Guide

Author: Marc Boorshtein

Publisher: Packt Publishing Ltd

ISBN: 9781803236094

Category: Computers

Page: 578

View: 852

Download BOOK »
Master core Kubernetes concepts important to enterprises from security, policy, and management point-of-view. Learn to deploy a service mesh using Istio, build a CI/CD platform, and provide enterprise security to your clusters. Key FeaturesExtensively revised edition to cover the latest updates and new releases along with two new chapters to introduce IstioGet a firm command of Kubernetes from a dual perspective of an admin as well as a developerUnderstand advanced topics including load balancing, externalDNS, global load balancing, authentication integration, policy, security, auditing, backup, Istio and CI/CDBook Description Kubernetes has taken the world by storm, becoming the standard infrastructure for DevOps teams to develop, test, and run applications. With significant updates in each chapter, this revised edition will help you acquire the knowledge and tools required to integrate Kubernetes clusters in an enterprise environment. The book introduces you to Docker and Kubernetes fundamentals, including a review of basic Kubernetes objects. You'll get to grips with containerization and understand its core functionalities such as creating ephemeral multinode clusters using KinD. The book has replaced PodSecurityPolicies (PSP) with OPA/Gatekeeper for PSP-like enforcement. You'll integrate your container into a cloud platform and tools including MetalLB, externalDNS, OpenID connect (OIDC), Open Policy Agent (OPA), Falco, and Velero. After learning to deploy your core cluster, you'll learn how to deploy Istio and how to deploy both monolithic applications and microservices into your service mesh. Finally, you will discover how to deploy an entire GitOps platform to Kubernetes using continuous integration and continuous delivery (CI/CD). What you will learnCreate a multinode Kubernetes cluster using KinDImplement Ingress, MetalLB, ExternalDNS, and the new sandbox project, K8GBConfigure a cluster OIDC and impersonationDeploy a monolithic application in Istio service meshMap enterprise authorization to KubernetesSecure clusters using OPA and GateKeeperEnhance auditing using Falco and ECKBack up your workload for disaster recovery and cluster migrationDeploy to a GitOps platform using Tekton, GitLab, and ArgoCDWho this book is for This book is for anyone interested in DevOps, containerization, and going beyond basic Kubernetes cluster deployments. DevOps engineers, developers, and system administrators looking to enhance their IT career paths will also find this book helpful. Although some prior experience with Docker and Kubernetes is recommended, this book includes a Kubernetes bootcamp that provides a description of Kubernetes objects to help you if you are new to the topic or need a refresher.

Learn Kubernetes Security

Learn Kubernetes Security

Author: Kaizhe Huang

Publisher: Packt Publishing Ltd

ISBN: 9781839212185

Category: Computers

Page: 330

View: 975

Download BOOK »
Secure your container environment against cyberattacks and deliver robust deployments with this practical guide Key FeaturesExplore a variety of Kubernetes components that help you to prevent cyberattacksPerform effective resource management and monitoring with Prometheus and built-in Kubernetes toolsLearn techniques to prevent attackers from compromising applications and accessing resources for crypto-coin miningBook Description Kubernetes is an open source orchestration platform for managing containerized applications. Despite widespread adoption of the technology, DevOps engineers might be unaware of the pitfalls of containerized environments. With this comprehensive book, you'll learn how to use the different security integrations available on the Kubernetes platform to safeguard your deployments in a variety of scenarios. Learn Kubernetes Security starts by taking you through the Kubernetes architecture and the networking model. You'll then learn about the Kubernetes threat model and get to grips with securing clusters. Throughout the book, you'll cover various security aspects such as authentication, authorization, image scanning, and resource monitoring. As you advance, you'll learn about securing cluster components (the kube-apiserver, CoreDNS, and kubelet) and pods (hardening image, security context, and PodSecurityPolicy). With the help of hands-on examples, you'll also learn how to use open source tools such as Anchore, Prometheus, OPA, and Falco to protect your deployments. By the end of this Kubernetes book, you'll have gained a solid understanding of container security and be able to protect your clusters from cyberattacks and mitigate cybersecurity threats. What you will learnUnderstand the basics of Kubernetes architecture and networkingGain insights into different security integrations provided by the Kubernetes platformDelve into Kubernetes' threat modeling and security domainsExplore different security configurations from a variety of practical examplesGet to grips with using and deploying open source tools to protect your deploymentsDiscover techniques to mitigate or prevent known Kubernetes hacksWho this book is for This book is for security consultants, cloud administrators, system administrators, and DevOps engineers interested in securing their container deployments. If you're looking to secure your Kubernetes clusters and cloud-based deployments, you'll find this book useful. A basic understanding of cloud computing and containerization is necessary to make the most of this book.

Hacking Kubernetes

Hacking Kubernetes

Author: Andrew Martin

Publisher: O'Reilly Media

ISBN: 1492081736

Category: Computers

Page: 300

View: 421

Download BOOK »
This practical book shows you how to attack and defend the popular container orchestrator, Kubernetes. Based on their combined 10 years of hands-on experience in designing, running, and attacking Kubernetes-based workloads and clusters, authors Andrew Martin and Michael Hausenblas equip cloud native security practitioners like you with the tools you need to be successful. You'll learn about Kubernetes default configurations, how to exploit them, and then defend against the attacks! The book takes a hands-on approach and teaches you what it takes to run Kubernetes securely, both on a strategic as well as an operational level.

Ethical Hacker’s Penetration Testing Guide

Ethical Hacker’s Penetration Testing Guide

Author: Samir Kumar Rakshit

Publisher: BPB Publications

ISBN: 9789355512154

Category: Computers

Page: 472

View: 825

Download BOOK »
Discover security posture, vulnerabilities, and blind spots ahead of the threat actor KEY FEATURES ● Includes illustrations and real-world examples of pentesting web applications, REST APIs, thick clients, mobile applications, and wireless networks. ● Covers numerous techniques such as Fuzzing (FFuF), Dynamic Scanning, Secure Code Review, and bypass testing. ● Practical application of Nmap, Metasploit, SQLmap, OWASP ZAP, Wireshark, and Kali Linux. DESCRIPTION The 'Ethical Hacker's Penetration Testing Guide' is a hands-on guide that will take you from the fundamentals of pen testing to advanced security testing techniques. This book extensively uses popular pen testing tools such as Nmap, Burp Suite, Metasploit, SQLmap, OWASP ZAP, and Kali Linux. A detailed analysis of pentesting strategies for discovering OWASP top 10 vulnerabilities, such as cross-site scripting (XSS), SQL Injection, XXE, file upload vulnerabilities, etc., are explained. It provides a hands-on demonstration of pentest approaches for thick client applications, mobile applications (Android), network services, and wireless networks. Other techniques such as Fuzzing, Dynamic Scanning (DAST), and so on are also demonstrated. Security logging, harmful activity monitoring, and pentesting for sensitive data are also included in the book. The book also covers web security automation with the help of writing effective python scripts. Through a series of live demonstrations and real-world use cases, you will learn how to break applications to expose security flaws, detect the vulnerability, and exploit it appropriately. Throughout the book, you will learn how to identify security risks, as well as a few modern cybersecurity approaches and popular pentesting tools. WHAT YOU WILL LEARN ● Expose the OWASP top ten vulnerabilities, fuzzing, and dynamic scanning. ● Get well versed with various pentesting tools for web, mobile, and wireless pentesting. ● Investigate hidden vulnerabilities to safeguard critical data and application components. ● Implement security logging, application monitoring, and secure coding. ● Learn about various protocols, pentesting tools, and ethical hacking methods. WHO THIS BOOK IS FOR This book is intended for pen testers, ethical hackers, security analysts, cyber professionals, security consultants, and anybody interested in learning about penetration testing, tools, and methodologies. Knowing concepts of penetration testing is preferable but not required. TABLE OF CONTENTS 1. Overview of Web and Related Technologies and Understanding the Application 2. Web Penetration Testing- Through Code Review 3. Web Penetration Testing-Injection Attacks 4. Fuzzing, Dynamic scanning of REST API and Web Application 5. Web Penetration Testing- Unvalidated Redirects/Forwards, SSRF 6. Pentesting for Authentication, Authorization Bypass, and Business Logic Flaws 7. Pentesting for Sensitive Data, Vulnerable Components, Security Monitoring 8. Exploiting File Upload Functionality and XXE Attack 9. Web Penetration Testing: Thick Client 10. Introduction to Network Pentesting 11. Introduction to Wireless Pentesting 12. Penetration Testing-Mobile App 13. Security Automation for Web Pentest 14. Setting up Pentest Lab

GitOps and Kubernetes

GitOps and Kubernetes

Author: Billy Yuen

Publisher: Simon and Schuster

ISBN: 9781638350729

Category: Computers

Page: 344

View: 740

Download BOOK »
GitOps and Kubernetes teaches you how to use Git and the GitOps methodology to manage a Kubernetes cluster. Summary GitOps and Kubernetes introduces a radical idea—managing your infrastructure with the same Git pull requests you use to manage your codebase. In this in-depth tutorial, you’ll learn to operate infrastructures based on powerful-but-complex technologies such as Kubernetes with the same Git version control tools most developers use daily. With these GitOps techniques and best practices, you’ll accelerate application development without compromising on security, easily roll back infrastructure changes, and seamlessly introduce new team members to your automation process. Purchase of the print book includes a free eBook in PDF, Kindle, and ePub formats from Manning Publications. About the technology With GitOps you use the Git version control system to organize and manage your infrastructure just like any other codebase. It’s an excellent model for applications deployed as containers and pods on Kubernetes. About the book GitOps and Kubernetes teaches you how to use Git and the GitOps methodology to manage a Kubernetes cluster. The book interleaves theory with practice, presenting core Ops concepts alongside easy-to-implement techniques so you can put GitOps into action. Learn to develop pipelines that trace changes, roll back mistakes, and audit container deployment. What's inside Managing secrets the GitOps way Controlling access with Git, Kubernetes, and Pipeline Branching, namespaces, and configuration About the reader For developers and operations engineers familiar with continuous delivery, Git, and Kubernetes. About the author Billy Yuen, Alexander Matyushentsev, Todd Ekenstam, and Jesse Suen are principal engineers at Intuit. They are widely recognized for their work in GitOps for Kubernetes. Table of Contents PART 1 - BACKGROUND 1 Why GitOps? 2 Kubernetes & GitOps PART 2 - PATTERNS & PROCESSES 3 Environment Management 4 Pipelines 5 Deployment Strategies 6 Access Control & Security 7 Secrets 8 Observability PART 3 - TOOLS 9 Argo CD 10 Jenkins X 11 Flux

Tribe of Hackers

Tribe of Hackers

Author: Marcus J. Carey

Publisher: John Wiley & Sons

ISBN: 9781119643401

Category: Computers

Page: 304

View: 215

Download BOOK »
Tribe of Hackers: Cybersecurity Advice from the Best Hackers in the World (9781119643371) was previously published as Tribe of Hackers: Cybersecurity Advice from the Best Hackers in the World (9781793464187). While this version features a new cover design and introduction, the remaining content is the same as the prior release and should not be considered a new or updated product. Looking for real-world advice from leading cybersecurity experts? You’ve found your tribe. Tribe of Hackers: Cybersecurity Advice from the Best Hackers in the World is your guide to joining the ranks of hundreds of thousands of cybersecurity professionals around the world. Whether you’re just joining the industry, climbing the corporate ladder, or considering consulting, Tribe of Hackers offers the practical know-how, industry perspectives, and technical insight you need to succeed in the rapidly growing information security market. This unique guide includes inspiring interviews from 70 security experts, including Lesley Carhart, Ming Chow, Bruce Potter, Robert M. Lee, and Jayson E. Street. Get the scoop on the biggest cybersecurity myths and misconceptions about security Learn what qualities and credentials you need to advance in the cybersecurity field Uncover which life hacks are worth your while Understand how social media and the Internet of Things has changed cybersecurity Discover what it takes to make the move from the corporate world to your own cybersecurity venture Find your favorite hackers online and continue the conversation Tribe of Hackers is a must-have resource for security professionals who are looking to advance their careers, gain a fresh perspective, and get serious about cybersecurity with thought-provoking insights from the world’s most noteworthy hackers and influential security specialists.

CEH v10 Certified Ethical Hacker Study Guide

CEH v10 Certified Ethical Hacker Study Guide

Author: Ric Messier

Publisher: John Wiley & Sons

ISBN: 9781119533269

Category: Computers

Page: 592

View: 458

Download BOOK »
As protecting information becomes a rapidly growing concern for today’s businesses, certifications in IT security have become highly desirable, even as the number of certifications has grown. Now you can set yourself apart with the Certified Ethical Hacker (CEH v10) certification. The CEH v10 Certified Ethical Hacker Study Guide offers a comprehensive overview of the CEH certification requirements using concise and easy-to-follow instruction. Chapters are organized by exam objective, with a handy section that maps each objective to its corresponding chapter, so you can keep track of your progress. The text provides thorough coverage of all topics, along with challenging chapter review questions and Exam Essentials, a key feature that identifies critical study areas. Subjects include intrusion detection, DDoS attacks, buffer overflows, virus creation, and more. This study guide goes beyond test prep, providing practical hands-on exercises to reinforce vital skills and real-world scenarios that put what you’ve learned into the context of actual job roles. Gain a unique certification that allows you to understand the mind of a hacker Expand your career opportunities with an IT certificate that satisfies the Department of Defense’s 8570 Directive for Information Assurance positions Fully updated for the 2018 CEH v10 exam, including the latest developments in IT security Access the Sybex online learning center, with chapter review questions, full-length practice exams, hundreds of electronic flashcards, and a glossary of key terms Thanks to its clear organization, all-inclusive coverage, and practical instruction, the CEH v10 Certified Ethical Hacker Study Guide is an excellent resource for anyone who needs to understand the hacking process or anyone who wants to demonstrate their skills as a Certified Ethical Hacker.