Down by the Docker

NotSoSecure Webinar on Docker Vulnerability

22 August 2017

Webinar Details

We at NotSoSecure did a 60 minutes webinar with 3 topics of 20 minutes each. One of them was “Down by the Docker”

Abstract

Docker is the new kool kid in town. This presentation covers some of the common goof-ups and what should be kept in mind when dealing with docker configurations.

Vulnerable VM

Download the Vulnerable Docker VM : https://www.notsosecure.com/vulnerable-docker-vm/

Event details

/slides/2017-down-by-the-docker/

AI Generated Summary

AI Generated Content Disclaimer

Note: This summary is AI-generated and may contain inaccuracies, errors, or omissions. If you spot any issues, please contact the site owner for corrections. Errors or omissions are unintended.

This presentation by Anant Shrivastava, delivered as a NotSoSecure webinar in 2017, provides a security-focused overview of Docker from a penetration tester’s perspective. The talk covers how Docker environments differ from traditional infrastructure during assessments, demonstrates three critical Docker misconfigurations that lead to host compromise, and outlines best practices for securing Docker deployments along with tools for configuration review and vulnerability scanning.

Key Topics Covered

Actionable Takeaways

  1. Never run container processes as root — always specify a non-root USER in Dockerfiles and verify that production containers are not running with UID 0, as root inside a container equals root on the host when filesystems are shared.
  2. Audit Docker socket and daemon exposure in your infrastructure: ensure /var/run/docker.sock is not mounted into application containers unless absolutely necessary, and never expose the Docker TCP port (2375/2376) without proper authentication and network restrictions.
  3. Implement regular patching for both the Docker host kernel and all container base images, since Docker’s shared-kernel architecture means a single kernel vulnerability compromises all containers on the host.
  4. Integrate container image scanning into your CI/CD pipeline using tools like Clair, Anchore, or Docker Security Scanning to catch known vulnerabilities before deployment.
  5. Restrict Docker group membership as carefully as you would restrict root access — any user in the Docker group can effectively gain root on the host through container creation.
  6. Practice Docker security assessment techniques using the NotSoSecure vulnerable Docker VM to build familiarity with identifying and exploiting these common misconfigurations in a safe environment.
  7. During penetration tests, check /proc/1/cgroup and PID 1 to identify containerized environments, then look for mounted host filesystems, exposed Docker sockets, and kernel vulnerabilities as escalation paths.

Social chatter