Enumeration

Get Distribution Codename
Check EOL
Check ExploitDB
Check PacketStorm
Check Kernel CVE
Check CVE Details
Check processes and Services
If /proc is mounted with the hidepid option set to invisible the processes on the system are only visible to the current user and root users
If you see knockd running
Check Port Knocking for more information to bypass this
/etc/sudoers
If the file is read-only, you need to change its permissions to allow write access:
Add the following line:
Restore the original file permissions to make it read-only again:
Scan the local network
Find one many hosts there are in the network by doing a
ping sweep:
If
ncis installed can be use to scan for open ports:
Use lft to trace hops in the network
If you suspect that there is a
VMordockerbeing hosted in a different port you can uselftand check if there are differences in the results.
Enumerating Docker
Host names are usually numerical IDs
Always check the environment variables
Confirm the presence of
.dockerenv
When the host's user information does not exist inside the container’s /etc/passwd file, file permissions will show numeric IDs instead of human-readable names.
If the socket is mounted you may be able to use docker-cli:
Understand the Network
Docker containers typically run in a private virtual network created by Docker, and the default network uses a subnet in the range 172.16.0.0/12
Check for Mounted File Systems
Look for vulnerabilities and misconfiguration
docker-cli
Check for containers running with elevated privileges (
--privileged,--cap-add).Look for containers that share host namespaces or file systems.
Last updated