Docker security
Attack vectors
Docker can be attacked on these vectors:
OS and kernel attacks
Network-based attacks
Daemon-based attacks
Image-based attacks
Application-based attacks.
Footprinting
Find out which host has a docker deamon running:
then output the running containers (-a also exited containers)
Find out if a container leaks information in the env config
AIf the container had been started with docker environment variables, these vars can leak information.
Example:
If you have access to docker container, you can read all of its environment variables by typing the env command.
Find out if memory had been allocated to a container
Verify if a particular container is suspectable for a Denial of service attack. If memory has been allocated, the container might be vulnerable to a DoS attack.
Example:
Show the memory allocation in the stats:
Attack docker
Defend docker
Last updated