Malicious Shell Script Steals AWS, Docker Credentials

In past cryptocurrency mining attacks, malicious shell scripts were commonly used as downloaders. However, recent cases show that these scripts are now used for other purposes such as stealing credentials. Read more

Similar

Full Docker Breakout Exploit

Unit 42 researchers share details on a severe Docker container breakout vulnerability and outline a proof-of-concept that demonstrates how it can be exploited if a container has been compromised by a previous attack. (more…)

Read more »

Down by the Docker: CTF with Containers

Ever fantasized about playing with docker misconfigurations, privilege escalation, etc. within a container? Download this VM, pull out your pentest hats and get started 🙂 We have 2 Modes: HARD: This would require you to combine your docker skills as well ... (more…)

Read more »