Jay Beale

4.3K posts

Jay Beale banner
Jay Beale

Jay Beale

@jaybeale

@InGuardians CEO, Bustakube, Peirates, IANS Faculty, BastilleLinux, #kubernetes @BlackHatEvents Trainer,#neurodivergent fam, he/him, [email protected]

InGuardians Seattle Katılım Ocak 2008
4.3K Takip Edilen6.3K Takipçiler
Sabitlenmiş Tweet
Jay Beale
Jay Beale@jaybeale·
Excited to teach #Kubernetes Attack & Defense @#BHUSA in Aug (@bhevents)! The class is >50% hands-on, w/ step-by-step labs. Students get computers to keep w/ CTF VMs & K8S cluster to #hack, win flags & break attacks. Come join me & the @InGuardians crew! #0-day-unnecessary-attacking-and-protecting-kubernetes-linux-and-containers-45335" target="_blank" rel="nofollow noopener">blackhat.com/us-25/training…
English
0
5
8
4.5K
Jay Beale retweetledi
Graham Helton (too much for zblock)
We can disagree on many things but dismissing this as a skill issue of kubernetes admins is absurd and insulting. Software that is the backbone of most major cloud infra deserves more scrutiny not less. All points were already addressed in the disclosure reddit.com/r/kubernetes/s…
Graham Helton (too much for zblock) tweet media
Graham Helton (too much for zblock)@GrahamHelton3

Excited to disclose my research allowing RCE in Kubernetes It allows running arbitrary commands in EVERY pod in a cluster using a commonly granted "read only" RBAC permission. This is not logged and and allows for trivial Pod breakout. Unfortunately, this will NOT be patched.

English
8
10
135
21.7K
Jay Beale
Jay Beale@jaybeale·
@GrahamHelton3 I’m so impressed with the work you’ve been doing in this space, Graham. Keep pursuing your passion!
English
0
0
1
25
Jay Beale retweetledi
Jay Beale retweetledi
Jayson E. Street 💙 🤗💛
Jayson E. Street 💙 🤗💛@jaysonstreet·
I was recently laid off, so I’m officially open to new opportunities. If you need a Hacker, or a teachable moment using Red Team tactics. I can also be a trainer, community builder & liaison. I want more than a job I need a company & purpose I can believe in. Please share! 💜🤗💜
Jayson E. Street 💙 🤗💛 tweet media
English
37
160
462
34.9K
Jay Beale retweetledi
Container Security CTF
Container Security CTF@CtfSecurity·
One of the Kubernetes CTF at DEF CON organizers, @jaybeale, is doing Kubernetes attack demos and Kubernetes security Q&A at the Wall of Sheep Village at 4:30pm today, Saturday. Come check it out! #DEFCON33
English
0
1
1
294
Jay Beale retweetledi
Queercon
Queercon@Queercon·
Queercon is getting set up at the #defcon33 kevops pool party, come find us!
Queercon tweet media
English
0
4
6
661
Jay Beale retweetledi
r00t
r00t@r00t0wns·
Family is forever.
r00t tweet media
English
2
6
44
4.5K
Jay Beale retweetledi
Sarah Young
Sarah Young@_sarahyo·
Achievement unlocked: a book I co-wrote at the @BlackHatEvents bookstore!
Sarah Young tweet media
English
10
46
673
21.8K
Jay Beale retweetledi
Container Security CTF
Container Security CTF@CtfSecurity·
Come play in one of two Kubernetes Capture the Flag events we're facilitating at #DEFCON 33! Fri – Sun: Learning CTF Saturday: Competitive CTF First Place Prize (for a team on-site at DEF CON) is a Bambu Labs A1 Mini 3D printer! containersecurityctf.com @defcon #DEFCON33
Container Security CTF tweet media
English
1
9
14
4.2K
Jay Beale
Jay Beale@jaybeale·
So excited to teach Kubernetes Attack and Defense in August at @BlackHatEvents #BlackHat!
InGuardians™@inguardians

Our own Justin Searle @meeas and @jaybeale are teaching industry leading courses at Black Hat next month! Join them to learn how to pen test, hands-on: Control Systems, IIoT and Kubernetes! Kubernetes: #0-day-unnecessary-attacking-and-protecting-kubernetes-linux-and-containers-45335" target="_blank" rel="nofollow noopener">blackhat.com/us-25/training… Control Systems and IIoT: #assessing-and-exploiting-control-systems-and-iiot-44520" target="_blank" rel="nofollow noopener">blackhat.com/us-25/training…

English
0
0
3
285
Jay Beale retweetledi
Today In Infosec
Today In Infosec@todayininfosec·
2008: Several DNS vendors released patches to mitigate an attack method discovered by Dan Kaminsky which could be used to cause DNS cache poisoning. Kaminsky had discovered the vulnerability 6 months prior and reported it to vendors privately so they could address it. RIP, Dan.
Today In Infosec tweet media
English
6
58
213
26.3K