Clone of https://github.com/rmusser01/Infosec_Reference . For those who would prefer to not be tracked by MS.
You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
 
 

15 KiB

Containers


Table of contents


https://www.digitalocean.com/community/tutorials/an-introduction-to-kubernetes https://github.com/kubernetes/community/blob/master/wg-security-audit/findings/AtredisPartners_Attacking_Kubernetes-v1.0.pdf

http://blog.sevagas.com/IMG/pdf/exploiting_capabilities_the_dark_side.pdf

https://blog.hansenpartnership.com/containers-and-cloud-security/

https://github.com/gravitational/gravity https://github.com/rexray/rexray https://wiki.unraid.net/UnRAID_6/Overview#Containers

  • How to Lose a Container in 10 Minutes - Sarah Young(BSidesSF 2019)
    • Moving to the cloud and deploying containers? In this talk I will discuss both the mindset shift and tech challenges, with some common mistakes made in real-life deployments with some real life (albeit redacted) examples. We'll also look at what happens to a container that's been left open to the Internet for the duration of the talk.

Understanding and HardeningLinux Containers - NCCGroup

https://storageos.com/why-containers-miss-a-major-mark-solving-persistent-data-in-docker/

https://blog.appsecco.com/analysing-and-exploiting-kubernetes-apiserver-vulnerability-cve-2018-1002105-3150d97b24bb?gi=da5afbcc2d73

https://www.blackhat.com/docs/us-17/thursday/us-17-Cherny-Well-That-Escalated-Quickly-How-Abusing-The-Docker-API-Led-To-Remote-Code-Execution-Same-Origin-Bypass-And-Persistence_wp.pdf https://blog.docker.com/2014/06/docker-container-breakout-proof-of-concept-exploit/ https://www.reddit.com/r/docker/comments/439a8h/exploiting_your_system_using_docker/ https://github.com/ProfessionallyEvil/harpoon https://github.com/P3GLEG/Whaler https://samaritan.ai/blog/reversing-docker-images-into-dockerfiles/ http://ifeanyi.co/posts/linux-namespaces-part-1/ http://ifeanyi.co/posts/linux-namespaces-part-2/

https://www.redhat.com/en/blog/architecting-containers-part-1-why-understanding-user-space-vs-kernel-space-matters

Mesos https://stackoverflow.com/questions/47769570/what-does-apache-mesos-do-that-kubernetes-cant-do-and-vice-versa?rq=1 https://stackoverflow.com/questions/26705201/whats-the-difference-between-apaches-mesos-and-googles-kubernetes?noredirect=1 https://stackoverflow.com/questions/28094147/what-does-apache-mesos-actually-do http://mesos.apache.org/documentation/latest/architecture/ http://mesos.apache.org/documentation/latest/ https://en.wikipedia.org/wiki/Apache_Mesos

https://www.notsosecure.com/vulnerable-docker-vm/

https://null-byte.wonderhowto.com/how-to/create-reusable-burner-os-with-docker-part-1-making-ubuntu-hacking-container-0175328/ https://null-byte.wonderhowto.com/how-to/create-reusable-burner-os-with-docker-part-2-customizing-our-hacking-container-0175353/

https://blog.docker.com/2017/09/day-life-docker-admin/ Peter Benjamins blogposts https://www.youtube.com/playlist?list=PLKDRii1YwXnLmd8ngltnf9Kzvbja3DJWx http://carnal0wnage.attackresearch.com/2019/01/kubernetes-master-post.html?m=1 https://www.youtube.com/watch?v=fVqCAUJiIn0&feature=youtu.be https://www.youtube.com/watch?v=UwBshgfnAGA

https://www.youtube.com/watch?v=ru7GicI5iyI https://docs.google.com/presentation/d/1u6S1ycs8DURORf6S9XYKjP56oszJpouOca6xlkH9ILs/edit#slide=id.p https://sysdig.com/blog/docker-image-scanning/

https://cloud.google.com/solutions/best-practices-for-operating-containers https://sysdig.com/blog/oss-container-security-runtime/ https://www.nccgroup.trust/us/about-us/newsroom-and-events/blog/2019/august/tools-and-methods-for-auditing-kubernetes-rbac-policies/ http://sven.stormbind.net/blog/posts/docker_from_30_to_230/

https://www.redhat.com/en/blog/architecting-containers-part-1-why-understanding-user-space-vs-kernel-space-matters [Docker] https://zeltser.com/security-risks-and-benefits-of-docker-application/ https://blog.docker.com/2014/06/docker-container-breakout-proof-of-concept-exploit/ http://www.slideshare.net/jpetazzo/linux-containers-lxc-docker-and-security https://www.blackhat.com/docs/eu-15/materials/eu-15-Bettini-Vulnerability-Exploitation-In-Docker-Container-Environments-wp.pdf https://www.sumologic.com/blog-security/securing-docker-containers/ https://www.nccgroup.trust/globalassets/our-research/us/whitepapers/2016/april/ncc_group_understanding_hardening_linux_containers-10pdf/

https://github.com/genuinetools/img

Containers

  • cgroups
    • 101
    • Articles/Blogposts/Writeups
    • Securing
    • Tools
  • Docker
    • 101
    • Articles/Blogposts/Writeups
    • Securing
    • Tools
  • Jails
  • Kubernetes
    • 101
    • Articles/Blogposts/Writeups
    • Securing
    • Tools
  • RunC
    • 101
    • Articles/Blogposts/Writeups
    • Securing
    • Tools
  • Mesos
    • 101
    • Articles/Blogposts/Writeups
    • Securing
    • Tools

https://github.com/coreos/clair https://github.com/freach/kubernetes-security-best-practice https://cloudplatform.googleblog.com/2018/03/exploring-container-security-an-overview.html?m=1 https://itnext.io/kubernetes-hardening-d24bdf7adc25 https://blog.ropnop.com/attacking-default-installs-of-helm-on-kubernetes/

* https://github.com/argoproj/argo

Docker

Docker

Dockerfiles - Jessie Frazelle


Containers