Главная
Study mode:
on
1
Intro
2
GOALS
3
ANATOMY
4
LIVE CAPTURE
5
COLD CAPTURE
6
IMAGE LISTING
7
IMAGE METADATA
8
CONTAINER METADATA
9
WHAT ABOUT DISK CONTENT?
10
ANTICIPATED LAYERS
11
STORAGE BACKEND: OVERLAY2
12
FINDING CONTAINER STORAGE
13
CONTAINER R/W LAYER
14
TOP IMAGE LAYER
15
RAW OVERLAYFS
16
WHAT ABOUT THE DURIAN?
17
EASY BUTTON!
18
STORAGE BACKEND: DEVICEMAPPER
19
THIN POOL DEVICES
20
ACCESSING A LAYER
21
MOUNTING THE LAYER
22
FURTHER ANALYSIS
23
SUMMARY
24
EXAMPLE CONTAINER
Description:
Explore the aftermath of a Docker app hack in this BSidesRDU 2018 conference talk. Dive into the anatomy of Docker containers, learn live and cold capture techniques, and understand image listing and metadata analysis. Examine container metadata, disk content, and anticipated layers. Investigate storage backends like Overlay2 and DeviceMapper, discovering how to find container storage and access individual layers. Follow along with practical examples, including mounting layers and conducting further analysis. Gain valuable insights into post-hack forensics and containment strategies for Docker environments.

Our Docker App Got Hacked - Now What

Add to list
0:00 / 0:00