云原生安全研究:针对容器的渗透测试方法
Common Information
Type Value
UUID 8cc777e6-31d3-4f65-a24b-b74d00d20ebf
Fingerprint a9299ddd37aff1f5
Analysis status DONE
Considered CTI value 0
Text language
Published April 17, 2020, midnight
Added to db Dec. 19, 2024, 5:42 p.m.
Last updated Dec. 23, 2024, 3:25 a.m.
Headline 云原生安全研究:针对容器的渗透测试方法
Title 云原生安全研究:针对容器的渗透测试方法
Detected Hints/Tags/Attributes 21/1/30
Source URLs
Attributes
Details Type #Events CTI Value
Details Domain 4694
github.com
Details Domain 1
stealth.openwall.net
Details Domain 29
man7.org
Details Domain 1490
twitter.com
Details Domain 20
blog.trailofbits.com
Details Domain 30
www.kernel.org
Details Domain 6752
163.com
Details File 300
www.cs
Details File 1
joren_vrancken___4593847___a_methodology_for_penetration_testing_docker_systems.pdf
Details File 15
daemon.json
Details File 1
当前宿主机上是否存在.doc
Details File 170
config.json
Details File 1
来读取任何可能存在的.doc
Details File 7
7.html
Details File 1
us-17-cherny-well-that-escalated-quickly-how-abusing-the-docker-api-led-to-remote-code-execution-same-origin-bypass-and-persistence_wp.pdf
Details File 1
针对docker容器网络的arp欺骗与中间人攻击.pdf
Details File 1
cgroups.txt
Details Github username 8
docker
Details Github username 6
knownsec
Details md5 1
6cec3da009d25cb1c766bb9dae809a86
Details Url 1
https://www.cs.ru.nl/bachelors-theses/2020/joren_vrancken___4593847___a_methodology_for_penetration_testing_docker_systems.pdf
Details Url 3
https://github.com/docker/docker-bench-security
Details Url 1
http://stealth.openwall.net/xsports/shocker.c
Details Url 1
http://man7.org/linux/man-pages/man7/capabilities.7.html
Details Url 1
https://www.blackhat.com/docs/us-17/thursday/us-17-cherny-well-that-escalated-quickly-how-abusing-the-docker-api-led-to-remote-code-execution-same-origin-bypass-and-persistence_wp.pdf
Details Url 1
https://github.com/knownsec/kcon/blob/master/2019/25日/针对docker容器网络的arp欺骗与中间人攻击.pdf
Details Url 1
https://mp.weixin.qq.com/s?__biz=mziyodyzntu2oa==&mid=2247487393&idx=1&sn=6cec3da009d25cb1c766bb9dae809a86&chksm=e84fa97edf382068250b4811419aa17811c7f244ab87dcbcbe63be328f98ecaf0ab9feeedf8c#rd
Details Url 1
https://twitter.com/_fel1x/status/1151487051986087936
Details Url 3
https://blog.trailofbits.com/2019/07/19/understanding-docker-container-escapes
Details Url 1
https://www.kernel.org/doc/documentation/cgroup-v1/cgroups.txt