Главная
Study mode:
on
1
Introduction
2
What is Docker
3
Advantages
4
Installing Docker
5
Docker Images
6
docker run
7
list containers
8
install tools
9
parrotos
10
bug bounty toolkit
11
Docker in DevOps
12
Docker for vulnerable web applications
Description:
Explore Docker's potential for pentesting and bug bounty hunting in this 39-minute conference talk from DEF CON DC9111. Learn about Docker's importance, advantages, and installation process. Discover how to set up Kali Linux, OWASP Juice Shop, and Bug Bounty Toolkit using Docker containers. Gain insights into Docker images, running containers, and installing essential tools. Understand Docker's role in DevOps and its application for vulnerable web applications. Access provided links to relevant GitHub repositories and Docker Hub images to enhance your cybersecurity toolkit.

Docker for Pentesting & Bug Bounty Hunting

HackerSploit
Add to list
0:00 / 0:00