By: Riddhi Shree
Host & Kernel Security
Container Breakout
Container Image Authenticity
Container Resource Abuse
Security Vulnerabilities in Static Images
Docker Credentials & Secrets
Runtime Security Monitoring
Download NOW!!!
Plain Old NMAP
-A: Enable OS detection, version detection
METASPLOIT:
Banner Grabbing
Vulnerability Detection
HYDRA:
SSH Brute Forcing
Port 8000 is serving a WordPress blog.
WPScan:
Enumeration
Sensitive Information
!!!
User Enumeration
HYDRA:
Form Password Cracking
Containerised Application Compromised Successfully!!!
How bad is it?!
PHP WEBSHELL
ACTIVATED!!!
By default, the root account of a Docker container can create device files, you may want to restrict this:
Separate User Namespace
This will limit the container to 2GB main memory, 3GB total (main + swap).
Use runtime security as an extra layer (and NOT as replacement for static countermeasures).