SupportAPI docsProduct updatesSign up for free
Search…
Snyk User Documentation
Introducing Snyk
Getting started
Snyk CLI
Snyk API
Snyk for IDEs
Snyk Apps
Snyk Integrations
SNYK PRODUCTS
Snyk Open Source
Snyk Code
Snyk Container
Snyk Infrastructure as Code
USING SNYK
Snyk Broker
User and group management
Fixing and prioritizing issues
Reports
More Snyk Tools
SNYK INFO
Disclosing vulnerabilities
How Snyk handles your data
SNYK TUTORIALS
Getting Started
Amazon Web Services
Atlassian
DevOps Pipeline with Bitbucket Cloud and Kubernetes
Prerequisites
Module 1 - Scanning and monitoring source code
Module 2 - Bitbucket Pipelines
Module 3 - Exploiting Tomcat RCE on Kubernetes
Initial Setup
RCE Vulnerability
Conclusion
DevSecOps with Bitbucket Cloud
Opsgenie
Snyk Security for Bitbucket Cloud
Broker for Bitbucket Data Center
CircleCI
Docker
Dynatrace
GCP
GitHub
Microsoft Azure
Oracle Cloud Infrastructure
Red Hat
SpringOne
Powered By GitBook
Initial Setup
The workshop depends on the following technologies, and is a command-line driven exercise.
  • Access to a Kubernetes cluster
  • Command-line access to docker
  • Command-line access to docker-compose
  • A clone of the repository java-goof
Next, we'll provide guidance to the instructions.
Previous
Module 3 - Exploiting Tomcat RCE on Kubernetes
Next
RCE Vulnerability
Last modified 1mo ago
Export as PDF
Copy link
Edit on GitHub