Docker security

Attack vectors

Docker can be attacked on these vectors:

  1. OS and kernel attacks

  2. Network-based attacks

  3. Daemon-based attacks

  4. Image-based attacks

  5. Application-based attacks.

Footprinting

Find out which host has a docker deamon running:

ps aux | grep dockerd

then output the running containers (-a also exited containers)

$ docker ps 

Find out if a container leaks information in the env config

AIf the container had been started with docker environment variables, these vars can leak information.

Example:

If you have access to docker container, you can read all of its environment variables by typing the env command.

Find out if memory had been allocated to a container

Verify if a particular container is suspectable for a Denial of service attack. If memory has been allocated, the container might be vulnerable to a DoS attack.

Example:

Show the memory allocation in the stats:

Attack docker

Defend docker

Last updated