By: Riddhi Shree
(DevOn)
Host & Kernel Security
Container Breakout
Container Image Authenticity
Container Resource Abuse
Security Vulnerabilities in Static Images
Docker Credentials & Secrets
Runtime Security Monitoring
Download NOW!!!
Plain Old NMAP
-A: Enable OS detection, version detection
METASPLOIT:
Banner Grabbing
Vulnerability Detection
HYDRA:
SSH Brute Forcing
Port 8000 is serving a WordPress blog.
WPScan:
Enumeration
Sensitive Information
!!!
User Enumeration
HYDRA:
Form Password Cracking
Containerised Application Compromised Successfully!!!
How bad is it?!
PHP WEBSHELL
ACTIVATED!!!
By default, the root account of a Docker container can create device files, you may want to restrict this:
Separate User Namespace
This will limit the container to 2GB main memory, 3GB total (main + swap).
Use runtime security as an extra layer (and NOT as replacement for static countermeasures).
"Docker Security Scanning"
"If you have root on the container, then you have root on the whole box."