Docker Container Penetration Testing | Docker VulnHub CTF Walkthrough

We covered the solution of Docker VulnHub lab where we performed a penetration testing for a Docker container running a WordPress website.

Docker Container Penetration Testing | Docker VulnHub CTF Walkthrough

We covered the solution of Docker VulnHub lab where we performed a penetration testing for a Docker container running a WordPress website.

Offensive Security Certified Professional Study Notes and Guide
This is a 1029 pages of notes that will guide and help you prepare for and pass the OSCP exam.Table of contents…
The Complete Practical Web Application Penetration Testing Course
Course Content:Introduction to Injection Vulnerabilities SQL Injection - Authentication Bypass SQL Injection - Error…

Dockers containers are used for virtualization purposes for speed, flexibility and security. They are much like virtual machines in that they are run separately but with the exception that dockers use the same kernel of the main OS in addition to the same RAM and CPU resources.

By definition it is the process of packaging an application and the necessary resources (such as libraries and packages) required into one package named a container to make it portable and run faster.

Docker looks similar to virtual machines, but the difference is that it runs directly on the kernel of the host by virtualising the OS and not on the hardware. Docker Service runs on the host itself and Containers runs top of it.
Virtual machines are considered more secure since they are more isolated and have their own operation system.
environment This instruction is used to pass environment variables i.e. passwords,usernames,etc.

Video Walkthrough