Showing posts with label Docker. Show all posts
Showing posts with label Docker. Show all posts

Thursday, February 27, 2014

[infosecinstitute] Securing Cloud-Based Applications with Docker

Introduction to Docker

In this article, we’ll first introduce Docker and try to explain how it works. After setting the stage, we’ll simulate the file upload vulnerability by copying the shell into the Redmine Docker image. This is effectively the same as if an attacker would find and exploit the vulnerability in Redmine, which would give him command-line access to the server.