
Ali Abdollahi
Information Security Researcher
Amstelveen, The Netherlands
Actions
Ali is a security researcher with over a decade of experience working in tech fields. Currently, he is enterprise application security lead at Canon EMEA.
Ali is a regular speaker or trainer at industry conferences and events such as: Confidence Conf 2020 , Hack In The Box 2023 AMS, DefCon 3x, IEEE AI-ML-Workshop-2021, SSD TyphoonCon 2x, c0c0n, BSides Toronto, Budapest, Calgary, Newcastle, Barcelona, OWASP Ottawa chapter, LeHack2022, NoNameCon, YASCon, COUNTERMEASURE Conference, DragonCon, COSAC 2022, Hacktivity, DefCon Holland, etc.
Moreover, he was a trainer at OWASP Summer of Security 2020, 2021 July training, and reviewer for Springer Cluster Computing Journal/Elsevier as well as the 2021 Global AppSec U.S. event.
Links
Area of Expertise
Topics
Kubernetes Container Orchestration Security Assessment
Kubernetes is one of the leading container orchestration technologies out there. In this course we will teach you how to deploy full featured master and worker nodes with standalone native persistent storage operators. After cluster deployment, we will start attacking the infrastructure and we will explain what is happening underlying and how to harden them.
In this course, a brief overview of container fundamentals will be discussed. After grasping the underlying containerization technology, various platforms to orchestrate them will be explained in details. Among them, Kubernetes as of the leading technologies out there will be chose and installed. Considering deploying a full-featured kubernetes cluster is a time-consuming task, by following a step by step installation, in this course we will show how each component of kubernetes is deployed and what are the security concerns and threats that may arise.
After installing the required infrastructure, we will start attacking the cluster in various scenarios and will show how to patch them. Moreover, common disclosed kubernetes vulnerabilities will be explained through various scenarios.
Auditing and hardening the installed cluster is a vital task to prevent attacks mentioned in this course. We will use various tools like “kube-bench, kubesec.io, etc” to asses currently installed cluster, find the threats and harden them.
Finally, we will show to deploy a sample application and start attacking it from application perspective.
Dev Ally, Zero-Days Foe
Traditional AppSec techniques such as testing, scanning, and code reviews are essential but often unable to protect against zero-day vulnerabilities before they are discovered and disclosed. In this talk, we will explore how Runtime Application Self-Protection (RASP) technologies can provide real-time behavioral monitoring and protection for applications during execution. We will dive into the limitations of pre-deployment security and explain why runtime protection is necessary. Furthermore, we will discuss the main components and architecture of a RASP solution, highlighting its key features and benefits. Attendees will gain insights into various RASP techniques, including behavioral analysis, anomaly detection, and machine learning, which are crucial for detecting unknown threats. Real-world examples of RASP preventing zero-day exploits and unknown attacks will be shared, showcasing its effectiveness in safeguarding applications. Lastly, we will provide best practices for implementing and integrating RASP into the CI/CD pipeline and DevOps workflow.
DefCamp Cluj-Napoca Sessionize Event

Ali Abdollahi
Information Security Researcher
Amstelveen, The Netherlands
Links
Actions
Please note that Sessionize is not responsible for the accuracy or validity of the data provided by speakers. If you suspect this profile to be fake or spam, please let us know.
Jump to top