January 2020 Chapter Meeting
January 22nd 2020 6pm-8pm
![]() |
Agenda: 6:00pm-6:15pm Networking 6:15pm-6:30pm Chapter Business 6:30pm-8:00pm Presentations | Location: Bellevue City Hall 450 110th Ave. NE Bellevue, WA 98009 |
attendance qualifies for 2 CISSP credits
Speakers:
Jack (Itgel) Ganbold, Associate Cloud Penetration Tester, Rhino Security Labs Cloud Container Attack Tool (CCAT) Docker, Kubernetes and other container technologies are becoming increasingly popular and are being adopted by many companies. In recent cloud pentesting engagements, we have similarly noticed that many of our clients use container technology to run their systems. Although there has been research and tool development on containers and their security, most of those are focused on image analysis and finding known vulnerabilities. Due to this lack of tools, we decided to build one for ourselves and named it the Cloud Container Attack Tool (CCAT for short). CCAT is a modular, open-source container post-exploitation attack tool created by and used for Rhino Security Labs pentests. In this talk, I will cover how penetration testers/red teamers can use CCAT to simulate real-world attack scenarios against container environments. We will start from enumerating Docker images and creating backdoors, attacking Kubelets and compromising Kubernetes clusters, and pulling metadata and other sensitive information through Kubernetes Pod and DaemonSet and many more. CCAT released as an open-source project to encourage collaboration and discussion of different container attack techniques and methodologies with both attackers and defenders. This way, both myself and the community can contribute new modules to expand the functionality and usefulness of CCAT continuously. Bio Jack is an Associate Cloud Pentester at Rhino, with a focus on testing the security of AWS, Azure, and GCP cloud environments. He comes from a background of full-stack development on web and mobile applications. Jack also founded the first Mongolian cryptocurrency wallet and sold it to one of the biggest Mongolian Financial groups. Recently, Jack created the Cloud Container Attack Tool (CCAT) which is a tool for testing the security of container environments based on his 3+ years of experience in container technology. and Chris Longman, Privacy Program Owner, Core Services, Microsoft "Don’t party like it’s 1999: Modernizing privacy compliance" At a time when every business is becoming a software company, leaders need new ways to enable privacy compliance at scale. This session illustrates the risks of holding on to out-of-date privacy compliance frameworks and instead details a modern approach that leverages “thinking like an engineer” to solve for GDPR, CCPA and future privacy requirements. Bio: Chris Longman leads Microsoft’s privacy compliance program for Core Services, which spans nearly 2,000 individual applications and systems that power the company’s internal tools and business processes. After starting a career as a software engineer on various components of Windows, he graduated from Gonzaga Law School in 2010 and practiced as a solo attorney counseling startups in acquisition. Wanting to dig into the difficult areas where the law and technology collide, he returned to Microsoft in 2014 to define and build new approaches to regulatory compliance, relying on his combined legal and software engineering backgrounds. An Issaquah native and “dog person,” Chris currently lives in Sammamish with his wife Lindsay, her two cats, and zero dogs.February 2020 Chapter Meeting
February 26th 2020 6pm-8pm
![]() |
Agenda: 6:00pm-6:15pm Networking 6:15pm-6:30pm Chapter Business 6:30pm-8:00pm Presentations | Location: Bellevue City Hall 450 110th Ave. NE Bellevue, WA 98009 |
attendance qualifies for 2 CISSP credits