docker:attack_docker_exposed_api
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
docker:attack_docker_exposed_api [2020/04/09 10:57] – peter | docker:attack_docker_exposed_api [2020/05/13 08:31] (current) – removed peter | ||
---|---|---|---|
Line 1: | Line 1: | ||
- | ====== Docker - Attack Docker exposed API ====== | ||
- | If you have enabled Docker Remote API, per [[Docker: | ||
- | |||
- | ---- | ||
- | |||
- | Information Gathering & Enumeration | ||
- | |||
- | ===== Do a port scan ===== | ||
- | |||
- | <code bash> | ||
- | sudo nmap -sS -T5 192.168.1.118 -p-Starting Nmap 7.01 ( https:// | ||
- | Nmap scan report for 192.168.1.118 | ||
- | Host is up (0.00076s latency). | ||
- | Not shown: 65498 closed ports, 35 filtered ports | ||
- | PORT STATE SERVICE | ||
- | 22/ | ||
- | 1234/tcp open docker | ||
- | MAC Address: 0C: | ||
- | </ | ||
- | |||
- | I had to scan more ports that the default top 1000 because the docker API port is not included :( | ||
- | Ok then, what about service detection? | ||
- | |||
- | nmap -sTV -p 2376 192.168.1.7Starting Nmap 7.01 ( https:// | ||
- | Nmap scan report for 192.168.1.7 | ||
- | Host is up (0.00038s latency). | ||
- | PORT STATE SERVICE | ||
- | 2376/tcp open 18.06.0-ce DockerService detection performed. Please report any incorrect results at https:// | ||
- | Nmap done: 1 IP address (1 host up) scanned in 77.78 seconds | ||
- | |||
- | This confirm that we are dealing with Docker, nmap also discovered the exact version of Docker, if we want to confirm it manyally we can issue a GET request to the endpoint located at: http://< |
docker/attack_docker_exposed_api.1586429854.txt.gz · Last modified: 2020/07/15 09:30 (external edit)