Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/cr0hn/dockerscan
Docker security analysis & hacking tools
https://github.com/cr0hn/dockerscan
docker docker-registry hacking registry scan security
Last synced: about 11 hours ago
JSON representation
Docker security analysis & hacking tools
- Host: GitHub
- URL: https://github.com/cr0hn/dockerscan
- Owner: cr0hn
- License: other
- Created: 2017-02-07T21:13:12.000Z (almost 8 years ago)
- Default Branch: master
- Last Pushed: 2020-05-27T08:36:02.000Z (over 4 years ago)
- Last Synced: 2025-01-18T12:02:43.181Z (8 days ago)
- Topics: docker, docker-registry, hacking, registry, scan, security
- Language: Python
- Homepage:
- Size: 166 KB
- Stars: 1,362
- Watchers: 64
- Forks: 200
- Open Issues: 9
-
Metadata Files:
- Readme: README.rst
- Changelog: CHANGELOG
- Funding: .github/FUNDING.yml
- License: LICENSE
Awesome Lists containing this project
- awesome-list-docker - dockerscan
README
dockerscan
==========*dockerscan: A Docker analysis & hacking tools*
.. image:: https://github.com/cr0hn/dockerscan/raw/master/doc/source/_static/dockerscan-logo.png
:height: 64px
:width: 64px
:alt: DockerScan logo+----------------+--------------------------------------------------+
|Project site | http://github.com/cr0hn/dockerscan |
+----------------+--------------------------------------------------+
|Issues | https://github.com/cr0hn/dockerscan/issues/ |
+----------------+--------------------------------------------------+
|Author | Daniel Garcia (cr0hn) / Roberto Munoz (robskye) |
+----------------+--------------------------------------------------+
|Documentation | http://dockerscan.readthedocs.org |
+----------------+--------------------------------------------------+
|Last Version | 1.0.0-Alpha-02 |
+----------------+--------------------------------------------------+
|Python versions | 3.5 or above |
+----------------+--------------------------------------------------+Support this project
====================Support this project (to solve issues, new features...) by applying the Github "Sponsor" button.
What's dockerscan
=================A Docker analysis tools
Very quick install
==================.. code-block:: bash
> python3.5 -m pip install -U pip
> python3.5 -m pip install dockerscanShow options:
.. code-block:: bash
> dockerscan -h
Available actions
=================Currently Docker Scan support these actions:
- Scan: Scan a network trying to locate Docker Registries
- Registry
- Delete: Delete remote image / tag
- Info: Show info from remote registry
- Push: Push an image (like Docker client)
- Upload: Upload a random file- Image
- Analyze: Looking for sensitive information in a Docker image.
- Looking for passwords in environment vars.
- Try to find any URL / IP in the environment vars.
- Try to deduce the user used internally to run the software. This is not trivial. If the entry point is a .sh file. Read the file and try to find call to sudo-like: “sudo”, “gosu”, “sh -u”… And report the user found.- Extract: extract a docker image
- Info: Get a image meta information
- Modify:- entrypoint: change the entrypoint in a docker
- **trojanize**: inject a reverser shell into a docker image
- user: change running user in a docker imageWhat's the difference from Clair or Docker Cloud?
=================================================The purpose of Dockerscan is different. It's foccussed in the attack phase.
Although Dockescan has some functionalities to detect vulnerabilities in Docker images and Docker registries, the objective is the attack.
Documentation
=============Documentation is still in progress... sorry!
For the moment we only have the slides presented at RootedCON Spain, the conference where Docker Scan was presented:
https://www.slideshare.net/cr0hn/rootedcon-2017-docker-might-not-be-your-friend-trojanizing-docker-images/1
Or you can watch it in video format (recommended):
https://youtu.be/OwX1e4y4JMk
Also, you can watch a dockerscan usage demo:
https://youtu.be/UvtBGIb3E3o
Contributing
============Any collaboration is welcome!
There are many tasks to do. You can check the `Issues `_ and send us a Pull Request.
License
=======This project is distributed under `BSD license `_