In the world of cybersecurity, penetration testing and vulnerability assessment are crucial steps in identifying and mitigating potential security threats. With the increasing number of web applications, the need for secure and reliable testing environments has become more important than ever. In this article, we will explore the world of vulnerable web applications, their importance […]
Docker for Pentester: Abusing Docker API
As you know, docking services are booming, docking container attacks are also on the rise. But this post will illustrate how the intruder is trying to compromise the docker API due to a weak setup. Table of Content Docker architecture Enable Docker API for Remote connection Abusing Docker API Docker Architecture Docker uses a client-server […]
Docker for Pentester: Image Vulnerability Assessment
We are moving from virtualization to containerization and we are all familiar with the container services such as docking or quay.io. You can pick a dock image for a particular application by selecting several choices. As you know, when a developer works with a container, it not only packs the program but is part of […]
Docker for Pentester: Pentesting Framework
As we all know, now that we live in the world of Virtualization, most of the organizations are completely reliable on virtual services to fulfil their hardware and software requirements, such as cloud and Container. Containers like Docker are also quite famous techniques used by organizations to build a virtual application environment. Today in this […]
Docker Privilege Escalation
In our previous article we have discussed “Docker Installation & Configuration”but today you will learn how to escalate the root shell if docker is running on the hots machine or I should say docker privilege escalation to spawn root shell. While we know that there is an issue with the docker that all the commands […]
Docker Installation & Configuration
Docker services are extensively used in IT operations, so it is very important that you start learning from docker basics. In this article, we will cover the installation and setup of the docker, along with its specific uses. Learn web application in Table of Content Introduction to docker Docker and its terminology Advantages of docker […]