Главная
Study mode:
on
1
Introduction
2
What is Docker
3
Why use Docker
4
Docker Architecture
5
Docker Registry
6
Build our own
7
Build the image
8
Docker files
9
Docker on OS X
10
Docker Port Forwarding
11
Running Handlers
12
Sharing Files
13
Sharing Software
14
Running Burp
15
Preferences
Description:
Explore the world of penetration testing using Docker in this 45-minute conference talk from BSidesLV 2015. Dive into Docker's architecture, registry, and practical applications for cybersecurity professionals. Learn how to build custom Docker images, create Dockerfiles, and leverage Docker on OS X. Discover techniques for port forwarding, running handlers, and sharing files and software within Docker containers. Gain insights into running Burp Suite and managing preferences in a containerized environment. Enhance your pentesting toolkit with Docker's powerful containerization capabilities.

Pentesting with Docker

BSidesLV
Add to list
0:00 / 0:00