云原生安全研究:针对容器的渗透测试方法
Tags
attack-pattern: | Ssh - T1021.004 Sudo - T1169 |
Common Information
Type | Value |
---|---|
UUID | 8cc777e6-31d3-4f65-a24b-b74d00d20ebf |
Fingerprint | a9299ddd37aff1f5 |
Analysis status | DONE |
Considered CTI value | 0 |
Text language | |
Published | April 17, 2020, midnight |
Added to db | Dec. 19, 2024, 5:42 p.m. |
Last updated | Dec. 23, 2024, 3:25 a.m. |
Headline | 云原生安全研究:针对容器的渗透测试方法 |
Title | 云原生安全研究:针对容器的渗透测试方法 |
Detected Hints/Tags/Attributes | 21/1/30 |
Source URLs
Redirection | Url | |
---|---|---|
Details | Source | https://www.secrss.com/articles/18752 |
URL Provider
Attributes
Details | Type | #Events | CTI | Value |
---|---|---|---|---|
Details | Domain | 4694 | github.com |
|
Details | Domain | 1 | stealth.openwall.net |
|
Details | Domain | 29 | man7.org |
|
Details | Domain | 1490 | twitter.com |
|
Details | Domain | 20 | blog.trailofbits.com |
|
Details | Domain | 30 | www.kernel.org |
|
Details | Domain | 6752 | 163.com |
|
Details | File | 300 | www.cs |
|
Details | File | 1 | joren_vrancken___4593847___a_methodology_for_penetration_testing_docker_systems.pdf |
|
Details | File | 15 | daemon.json |
|
Details | File | 1 | 当前宿主机上是否存在.doc |
|
Details | File | 170 | config.json |
|
Details | File | 1 | 来读取任何可能存在的.doc |
|
Details | File | 7 | 7.html |
|
Details | File | 1 | us-17-cherny-well-that-escalated-quickly-how-abusing-the-docker-api-led-to-remote-code-execution-same-origin-bypass-and-persistence_wp.pdf |
|
Details | File | 1 | 针对docker容器网络的arp欺骗与中间人攻击.pdf |
|
Details | File | 1 | cgroups.txt |
|
Details | Github username | 8 | docker |
|
Details | Github username | 6 | knownsec |
|
Details | md5 | 1 | 6cec3da009d25cb1c766bb9dae809a86 |
|
Details | Url | 1 | https://www.cs.ru.nl/bachelors-theses/2020/joren_vrancken___4593847___a_methodology_for_penetration_testing_docker_systems.pdf |
|
Details | Url | 3 | https://github.com/docker/docker-bench-security |
|
Details | Url | 1 | http://stealth.openwall.net/xsports/shocker.c |
|
Details | Url | 1 | http://man7.org/linux/man-pages/man7/capabilities.7.html |
|
Details | Url | 1 | https://www.blackhat.com/docs/us-17/thursday/us-17-cherny-well-that-escalated-quickly-how-abusing-the-docker-api-led-to-remote-code-execution-same-origin-bypass-and-persistence_wp.pdf |
|
Details | Url | 1 | https://github.com/knownsec/kcon/blob/master/2019/25日/针对docker容器网络的arp欺骗与中间人攻击.pdf |
|
Details | Url | 1 | https://mp.weixin.qq.com/s?__biz=mziyodyzntu2oa==&mid=2247487393&idx=1&sn=6cec3da009d25cb1c766bb9dae809a86&chksm=e84fa97edf382068250b4811419aa17811c7f244ab87dcbcbe63be328f98ecaf0ab9feeedf8c#rd |
|
Details | Url | 1 | https://twitter.com/_fel1x/status/1151487051986087936 |
|
Details | Url | 3 | https://blog.trailofbits.com/2019/07/19/understanding-docker-container-escapes |
|
Details | Url | 1 | https://www.kernel.org/doc/documentation/cgroup-v1/cgroups.txt |