Reading Time: 3 minutes

Docker for Pentesters

Docker is truly one of the most fascinating changes to come to software development over the last 10 years. While the concept of containerization has been around since 1979; starting with the advent of chroot. Docker has revolutionized how containerization works. Docker made it easy to not only use containers but downloading fully functional environments can be done with a single Docker command line. This provides a lot of opportunities to create portable environments that penetration testers, security researchers, and others can pull, view, and see real exploits and Proof of Concepts (PoCs). In addition to distributing PoC environments, some communities like the creators of Parrot OS have been put their security operating system in Linux containers making it even more portable.

Docker Hub

Finding Docker images is easy! A quick Google search can lead you to many sources but I recommend using Docker Hub. It’s also important to vet your images before pulling (downloading) them because they could be malicious.

Please pull images from reputable sources.

https://hub.docker.com/
https://hub.docker.com/u/vulnerables

Parrot OS in Docker

The Parrot Project is an all-in-one framework for cybersecurity, software developers, and privacy enthusiasts. They have taken their Linux distribution and ported an enormous amount of their functionality into a Docker container. This allows the Parrot OS Docker image to be run on Windows, Digital Ocean, or anywhere you can run Docker. It is really that portable.

https://docs.parrotlinux.org/getting-started/install-docker/

I wrote a nice article showcasing some of the Parrot Docker image’s functionality.

Portable Security Applications

Some security applications are actually web applications that have been made portable through Docker. In this example, I will cover OWASP’s ZAP Baseline Scan.

OWASP’s ZAP Baseline Scan

The ZAP Baseline Scan Docker image can be used to scan websites for vulnerabilities. Because this is in a Docker container it can be easily incorporated into a DevSecOps pipeline for integrated security testing of applications. I also included a link to a sample GitHub Action for automated scanning.

https://www.zaproxy.org/docs/docker/baseline-scan/

https://github.com/zaproxy/action-baseline

Docker Vulnerable Web Apps

There are plenty of exploitable web applications that you can pull from Docker hub. These pre-configured environments come loaded with vulnerabilities that are mostly practical for learning how to do bug hunting.

Download a copy of OWASP’s ZAP Proxy or Burp Suite Community and you can get started learning basic web app penetration testing.

Damn Vulnerable Web App (DVWA)

https://hub.docker.com/r/vulnerables/web-dvwa/

Damn Vulnerable Web App (DVWA) is a classic vulnerable application that has been around for ages. Pulling the Docker image for DVWA is easy and fun! Try it out!

OWASP’s Juice Shop

https://hub.docker.com/r/bkimminich/juice-shop

A modern JavaScript based shopping cart loaded with vulnerabilities that can be exploited.

Docker for CVEs/PoCs

Suppose you are a security researcher and you’ve just discovered a bug in a WordPress plugin. Using Docker Compose it’s easy to create a GitHub repository that allows other security professionals to pull the image, spin up a MySQL database, WordPress and have the exact vulnerable plugin installed to demonstrate the PoC and exploit. This is a great way for pen-testers to learn, practice, and distribute their PoCs.

GitHub – Vulncrate: WP Code Snippets (CVE-2020-8417)

Wrapping up

I hope this expands people’s views on Docker and contributes to the community. If I missed anything or think something I should add, leave a comment below. If you like what I create, add me on LinkedIn, Twitter, follow my blog, YouTube channels, and future concepts like VulnCrate, Hackaco, and my personal YouTube.