Reverse Engineering Methodology Applied to Containers - Enhancing Intruder Dilemma Part II

 Read Time: 5 Minutes

Continuing sharing my research that started last year I am releasing my slide deck for "REM(Containers) - The real Xanthe".  I just presented on this and plan to continue to release content that addresses forensic analysis of containerization related technology and eventually relating that back to full CI/CD analysis.  The release list as of now looks like this:

  • Docker Forensics*
  • Malicious Container Analysis*
  • K8S Forensics
  • SAAS Containerization Forensics
  • CI/CD Forensics



Stay tuned for more content and leave your suggestions below!

Comments

Popular posts from this blog

Digital Forensics Applied to Kubernetes - Enhancing Intruder Dilemma Part III

Digital Forensics Applied to Containers - Enhancing Intruder Dilemma Part 1

Doppelgänging and Digital Forensic Analysis - Part Deux