Overview
Explore the world of penetration testing using Docker in this 45-minute conference talk from BSidesLV 2015. Dive into Docker's architecture, registry, and practical applications for cybersecurity professionals. Learn how to build custom Docker images, create Dockerfiles, and leverage Docker on OS X. Discover techniques for port forwarding, running handlers, and sharing files and software within Docker containers. Gain insights into running Burp Suite and managing preferences in a containerized environment. Enhance your pentesting toolkit with Docker's powerful containerization capabilities.
Syllabus
Introduction
What is Docker
Why use Docker
Docker Architecture
Docker Registry
Build our own
Build the image
Docker files
Docker on OS X
Docker Port Forwarding
Running Handlers
Sharing Files
Sharing Software
Running Burp
Preferences
Taught by
BSidesLV