To introduce Docker to security professionals and help them understand how it works,
How we as security professionals can use Docker during our engagements and save time.
How we could attack Docker
Table of Contents:
- Introduction to Docker
- How Docker works
- Running Basic docker commands
- docker pull
- docker images
- docker run
- docker exec
- How to write a Dockerfile
- Docker compose
- Scanning docker images for security vulnerabilties using tools
- Attacking Docker
- Enumerating Docker containers
- Using code execution to gain access to host machine
- Using docker.sock file mounted on host machine
- Adding user to host machine leveraging volume mount misconfiguration
- Case study of CVE-2019-5736
- Securing Docker
Comfortable using basic linux commands
Comfortable using bind and reverse shell
Attendees must ensure that they have following,
Working AWS account to create EC2 instance under free tier
If using a Windows machine have SSH client installed and ensure that you could connect to the AWS EC2 instance.
Laptop with working internet connection as the venue might not provide internet connetion.
Please ensure that you have a working AWS account and internet connection.
If you have any problems with your AWS account please get in touch with the AWS support team and have your account activated.
Starts at Saturday May 11 2019, 09:30 AM. The sessions runs for about 6 hours.