This is the second part of the book and it delves deeper into analyzing the security of Docker containers. It looks at various attacks that allow an attacker to compromise Docker containers. In addition, this part also introduces readers to Docker Swarm and shows how docker swarm can be compromised. This book should help pentesters, red teamers and offensive security folks understand how to compromise Docker containers and its orchestration environment called Docker Swarm.
Category Archives: Container-Security
Advanced Penetration Testing: Hacking Docker
This book delves deeper into analyzing the security of Docker and Kubernetes environment. This is the seventh part of the book series “Red Team: An attack paradigm”.