Overview
Watch a 43-minute cybersecurity tutorial that demonstrates how to solve a Capture The Flag (CTF) challenge focused on command injection vulnerabilities in Docker layers. Dive deep into practical cybersecurity concepts through hands-on exploitation of Docker container security weaknesses, learning essential penetration testing techniques and understanding how attackers can leverage command injection flaws. Gain valuable insights into Docker security, container vulnerabilities, and defensive strategies while following along with detailed explanations and live demonstrations of the attack methodology.
Syllabus
Capture the Flag! Command Injection by Docker Layers
Taught by
John Hammond