-
Raunak Parmar White Knight Labs
-
Bobby Schwass White Knight Labs
- Dates: May 11, 12 and 13 2026
- Difficulté: Moyen
- Format: Hybride
- Langue: Anglais
Description
The ASCPC On-Demand course blends offensive and defensive techniques across a variety of CI/CD platforms, focusing on practical, hands-on skills. Students will explore vulnerabilities, exploit misconfigurations, and learn how to defend against real-world CI/CD threats.
Key focus areas include:
- GitHub Actions Security: Explore context injection, pull request abuse, artifact poisoning, and misconfigured OIDC workflows.
- CircleCI Misconfigurations: Hijack pipeline configurations and exploit insecure runner setups.
- AWS CodeBuild Exploitation: Abuse IAM roles, environment variables, and pipeline triggers to escalate privileges and exfiltrate secrets.
- Docker Registry Attacks: Inject malicious images and perform credential harvesting through poorly secured registries.
- Kubernetes Integration Risks: Compromise clusters via CI/CD, enumerate resources, and escalate access across pods and containers.
- Azure DevOps Abuse: Leak credentials, escalate privileges, and abuse service connections in insecure Azure DevOps pipelines.
- Each module is supported by guided labs that simulate real CI/CD environments and include both offensive attack paths and defensive remediation strategies.
Objectifs clés d'apprentissage
Identify and exploit misconfigurations in GitHub, CircleCI, and cloud-integrated CI/CD pipelines
Perform attacks such as context injection, artifact poisoning, OIDC abuse, and pipeline hijacking
Implement effective defenses through permissions hardening, workflow validation, and policy enforcement
Harden DevOps pipelines across cloud environments, container orchestration, and source control systems
Apply offensive and defensive techniques to secure real-world CI/CD workflows
À qui s'adresse cette formation ?
DevOps and DevSecOps Engineers: Professionals who design and manage CI/CD pipelines and want to integrate security into every stage of the development process.
Penetration Testers and Red Team Operators: Those who want to expand their capabilities into CI/CD-focused attack paths, supply chain exploitation, and real-world offensive tooling in cloud-native environments.
Cloud and Application Security Engineers: Security professionals tasked with reviewing infrastructure-as-code, cloud deployments, or pipeline configurations.
Blue Team Analysts and Defenders: Analysts who need to understand attacker techniques in order to better detect, respond to, and mitigate pipeline-based intrusions.
Cybersecurity Students and Enthusiasts: Learners with foundational experience in cloud or security who are ready to move into more advanced, applied content. If you’re looking to move beyond theory and gain practical experience in attacking and securing real-world CI/CD pipelines, the ASCPC On-Demand course is built for you.
Connaissances prérequises
This is an intermediate to advanced course. Students should have a background in cloud security, development pipelines, or general cybersecurity.
Exigences matérielles
– Two GitHub accounts – Access to AWS and Azure environments – Docker installed on the host machine – Admin access to your local system and cloud platforms
Bio
Raunak Parmar , White Knight Labs
Raunak Parmar is an information security professional whose areas of interest include web penetration testing, Azure/AWS security, source code review, scripting, and web development.
Raunak likes to research new attack methodologies and create open-source tools that can be used during the Cloud Security assessments. He has worked extensively on Azure and AWS.
He is the author of Vajra and 365-Stealer an offensive cloud security tool. He has spoken at multiple conferences like Blackhat, Def Con, NorthSec, HITB, Null Con Goa, RootCon, HackSpaceCon, HackRedCon, Vulncon and local meetups.
Bobby Schwass , White Knight Labs
Robert Schwass is a senior security engineer and offensive security practitioner with 15+ years of experience designing, breaking, and securing modern application and cloud platforms. He specializes in application security, CI/CD and software supply-chain security, and API security, with deep hands-on expertise across AWS, Kubernetes, GitHub Advanced Security, and infrastructure as code. Robert has led red-team operations, penetration tests, and large-scale security assessments that uncover real-world attack chains—from source control to production—while also building practical security controls that developers actually adopt.
Currently a Principal Product Security Engineer, Robert is known for building enterprise SSDLC programs, automating security at scale, and embedding security directly into code pipelines. His work bridges offensive security and engineering, enabling organizations to ship faster without increasing risk. He holds a Master's in Information Security and multiple industry certifications, including OSCP and several SANS credentials.