Session

Hacking Docker Environment using Pivoting Techniques

Demonstrating an exploit in a Container environment (three dockers) across three different networks, I will demonstrate different pivot, vulnerability exploit, and privilege escalation techniques on all machines using Alpine Linux, Gogs app, and other linux platforms. Using Pentest methodologies such as recon, enumeration, exploitation, and post-exploitation. By the end of this “talk” everyone will be able to see different ways that exist in working with a single form of pivot and how to overcome different obstacles in different networks within this “new” environment called Docker;

Filipi Pires

Threat Researcher and Cybersecurity Advocate

Espinho, Portugal

Actions

Please note that Sessionize is not responsible for the accuracy or validity of the data provided by speakers. If you suspect this profile to be fake or spam, please let us know.

Jump to top