Well, That Escalated Quickly! How Abusing Docker API Led to Remote Code Execution, Same Origin Bypass and Persistence in the Hypervisor via Shadow Containers

Well, That Escalated Quickly! How Abusing Docker API Led to Remote Code Execution, Same Origin Bypass and Persistence in the Hypervisor via Shadow Containers

Black Hat via YouTube Direct link

DOCKER API CALLS THAT DON'T VIOLATE SOP

12 of 33

12 of 33

DOCKER API CALLS THAT DON'T VIOLATE SOP

Class Central Classrooms beta

YouTube playlists curated by Class Central.

Classroom Contents

Well, That Escalated Quickly! How Abusing Docker API Led to Remote Code Execution, Same Origin Bypass and Persistence in the Hypervisor via Shadow Containers

Automatically move to the next video in the Classroom when playback concludes

  1. 1 aqua Well. That Escalated Quickly!
  2. 2 FOCUS
  3. 3 MENU
  4. 4 VIRTUAL MACHINES VS CONTAINERS
  5. 5 CONTAINERS EVERYWHERE
  6. 6 CONTAINER ADOPTION STATS
  7. 7 DEVELOPERS AS TARGETS
  8. 8 ATTACK OVERVIEW -WINDOWS 10
  9. 9 DOCKER 4 WINDOWS / MAC
  10. 10 BROWSER SECURITY
  11. 11 SAME ORIGIN POLICY (SOP)
  12. 12 DOCKER API CALLS THAT DON'T VIOLATE SOP
  13. 13 BUILD IMAGE API CALL → REVERSE SHELL DEMO
  14. 14 ABUSE DOCKER BUILD
  15. 15 DOCKER FIX
  16. 16 WHAT'S NEXT?
  17. 17 LIMITATIONS
  18. 18 DNS REBINDING - HISTORY
  19. 19 DNS REBINDING - HOW IT WORKS
  20. 20 WHY NOT USE DNS REBINDING?
  21. 21 ATTACKING LLMNR
  22. 22 HOST REBINDING DEMO
  23. 23 RECAP
  24. 24 MISSING PERSISTENCE & CONCEALMENT
  25. 25 PERSISTENT AND CONCEALED
  26. 26 SHADOW CONTAINER-SHUTDOWN SCRIPT
  27. 27 SHADOW CONTAINER - MYSCRIPT.SH
  28. 28 FULL ATTACK DEMO
  29. 29 ADVANCED PERSISTENT THREAT
  30. 30 SHADOW WORM
  31. 31 ATTACK FLAVORS
  32. 32 MITIGATION
  33. 33 BLACK HAT SOUND BYTES

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.