Docker Container Penetration Testing | Docker VulnHub CTF Walkthrough

Motasem Hamdan
2 min readMar 2, 2024

--

We covered the solution of Docker VulnHub lab where we performed a penetration testing for a Docker container running a WordPress website.

Dockers containers are used for virtualization purposes for speed, flexibility and security. They are much like virtual machines in that they are run separately but with the exception that dockers use the same kernel of the main OS in addition to the same RAM and CPU resources.

By definition it is the process of packaging an application and the necessary resources (such as libraries and packages) required into one package named a container to make it portable and run faster.

Docker looks similar to virtual machines, but the difference is that it runs directly on the kernel of the host by virtualising the OS and not on the hardware. Docker Service runs on the host itself and Containers runs top of it.
Virtual machines are considered more secure since they are more isolated and have their own operation system.
environment This instruction is used to pass environment variables i.e. passwords,usernames,etc.

Video Walkthrough

--

--

Motasem Hamdan
Motasem Hamdan

Written by Motasem Hamdan

Motasem Hamdan is a content creator and swimmer who creates cyber security training videos and articles. https://www.youtube.com/@MotasemHamdan

No responses yet