Bug Hunter Handbook
  • Introduction
  • Getting Started in InfoSec and Bug Bounties.
  • Presentations
  • Checklists / Guides
  • Useful Twitter Threads
  • List of Vulnerabilities
    • Recon and OSINT
      • Recon
      • Sensitive information using Github
      • Subdomain Enumeration
        • Resolvers
      • Javascript Enumeration
      • After Recon
      • Finding Information Using Public Resources
      • OSINT
      • Cloud
      • Wayback
      • Parameter / Content Discovery
      • Broken Link Highjacking
    • Host Header
    • Injection
      • Other Injection
    • DNS Rebinding
    • Cross Site Scripting (XSS)
      • Weaponizing XSS
      • WAF Bypass
    • Cross Origin Resource Sharing (CORS)
    • Local / Remote File Inclusion (LFI / RFI)
    • Server Side Request Forgery (SSRF)
    • Remote Code Execution (RCE)
    • XML Entity Injecton (XXE)
    • Price Manipulation
    • Directory / Path Traversal
    • Cross Site Request Forgery (CSRF)
      • JSON CSRF
    • Password Reset
    • Login Page Issues
    • Deserialization Attacks
    • File Upload
    • Account Takeover
    • Insecure Direct Object References (IDOR)
    • Open Redirect
    • Business Logic Flaws
    • Rate Limit Bypass / 2FA / OTP Bypass
    • Ruby on Rails
      • Mass Assginment
    • S3 Bucket
    • Race Condition
    • CRLF
    • SSTI
    • Prototype Pollution
  • Approach
  • API Security
  • Mobile Security
  • Fuzzing / Wordlists
  • BugBounty Short Write-ups
  • Burp Suite Tips and Tricks
  • HackerOne Reports
  • Response Manipulation
  • Client Vs Server Side Vulnerabilities
  • DevSecOps
  • Containers
    • Docker
    • Kubernetes
    • Containers
  • AWS
  • Azure
  • Others
    • Code Review
    • Web Sockets
    • Web Cache
    • HTTP Desync Attacks
    • Zone Transfer
    • CSP Bypass
    • Payment Bypasses
    • Http Parameter Pollution
    • Postmessage
    • Others
    • GraphQL
    • Unix / Linux
    • Email Related
    • Dependency confusion
    • Nginx Misconfigs
    • JIRA
    • OAUTH
  • Chaining of Bugs
  • Bug Bounty Automation
  • Mindmaps
  • Oneliner Collections
  • Red Teaming
  • Blue Teamining
  • Recon One Liners
  • Misc
  • Wordpress
  • Fuzzing / FuFF
  • OWASP ZAP
  • Bug List
  • Setting up burp collaborator
  • Admin Panel PwN
  • Credential Stuffing / Dump / HaveibeenPwned?
  • Tools Required
  • Nuclei Template
  • Other BugBounty Repos / Tips
  • Interview
  • Threat Modelling
  • AppSec
Powered by GitBook
On this page

Was this helpful?

  1. Containers

Docker

PreviousContainersNextKubernetes

Last updated 6 months ago

Was this helpful?

Docker

  • - nice one

  • - **

Tools:

DAgda

Hadolint / Dockle

Learning:

  • Katacoda

  • play with docker

Best Practices:

Blogs:

For Practice:

Security

https://unit42.paloaltonetworks.com/breaking-docker-via-runc-explaining-cve-2019-5736/
https://blog.trailofbits.com/2019/07/19/understanding-docker-container-escapes/
https://capsule8.com/blog/practical-container-escape-exercise/
https://blog.pentesteracademy.com/abusing-sys-module-capability-to-perform-docker-container-breakout-cf5c29956edd?gi=d6343c6632fe

docker linter ,

- CIS Benchmark

Container Breakouts-

+

https://github.com/falcosecurity/falco-security-workshop
https://cloudsecwiki.com/docker.html
https://github.com/docker/docker-bench-security
https://github.com/kost/dockscan
https://www.sans.org/reading-room/whitepapers/auditing/checklist-audit-docker-containers-37437
https://www.digitalocean.com/community/tutorials/how-to-audit-docker-host-security-with-docker-bench-for-security-on-ubuntu-16-04
https://github.com/aquasecurity/trivy#vs-quay-docker-hub-gcr
https://github.com/anchore/anchore-engine
https://blog.aquasec.com/aqua-microscanner-free-image-vulnerability-scanning-plug-in-for-jenkins
https://www.slideshare.net/jpetazzo/anatomy-of-a-container-namespaces-cgroups-some-filesystem-magic-linuxcon
https://learnk8s.io/blog/smaller-docker-images
https://stackoverflow.com/questions/16047306/how-is-docker-different-from-a-virtual-machine
https://www.fosstechnix.com/docker-command-cheat-sheet/
https://github.com/docker-slim/docker-slim
https://github.com/madhuakula/introduction-to-containers-using-docker/blob/master/workshop.md
https://container.training/
https://www.reddit.com/r/docker/comments/9n9e73/the_three_container_security_golden_rules/
https://www.reddit.com/r/devops/comments/9vc562/docker_security_best_practices_host_image_runtime/
https://www.cisecurity.org/benchmark/docker/
https://github.com/BretFisher/ama/issues/17?utm_campaign=FasterOps%3A%20Improving%20Your%20Container%20DevOps%20Skills&utm_medium=email&utm_source=Revue%20newsletter
https://www.digitalocean.com/community/tutorials/how-to-audit-docker-host-security-with-docker-bench-for-security-on-ubuntu-16-04
https://opensource.com/article/18/10/podman-more-secure-way-run-containers
https://www.giantswarm.io/blog/building-container-images-with-podman-and-buildah
https://medium.com/better-programming/what-goes-into-a-dockerfile-ff0ace591060
https://www.practical-devsecops.com/author/secfigo/page/2/
https://www.notsosecure.com/vulnerable-docker-vm/
https://aws.amazon.com/about-aws/whats-new/2019/10/announcing-image-scanning-for-amazon-ecr/
https://blog.aquasec.com/docker-security-best-practices
https://dev.to/petermbenjamin/docker-security-best-practices-45ih
https://www.cs.ru.nl/bachelors-theses/2020/Joren_Vrancken___4593847___A_Methodology_for_Penetration_Testing_Docker_Systems.pdf
https://dreamlab.net/en/blog/post/abusing-dockersock-exposure/
https://blog.trailofbits.com/2019/07/19/understanding-docker-container-escapes/
https://dejandayoff.com/the-danger-of-exposing-docker.sock/
https://smart7.in/2021/01/30/Securing-Docker-From-Privilege-Escalation.html
https://blog.nody.cc/posts/container-breakouts-part1/
https://i.blackhat.com/USA-20/Wednesday/us-20-Berta-Defending-Containers-Like-A-Ninja-A-Walk-Through-The-Advanced-Security-Features-Of-Docker-And-Kubernetes.pdf
https://ajxchapman.github.io/containers/2020/11/19/privileged-container-escape.html