Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/heroku/bheu19-attacking-cloud-builds
Slides, Cheatsheet and Resources from our Blackhat EU talk
https://github.com/heroku/bheu19-attacking-cloud-builds
Last synced: 21 days ago
JSON representation
Slides, Cheatsheet and Resources from our Blackhat EU talk
- Host: GitHub
- URL: https://github.com/heroku/bheu19-attacking-cloud-builds
- Owner: heroku
- Archived: true
- Created: 2019-12-04T08:04:01.000Z (about 5 years ago)
- Default Branch: master
- Last Pushed: 2020-08-24T17:05:48.000Z (over 4 years ago)
- Last Synced: 2024-10-18T20:42:57.091Z (about 2 months ago)
- Language: Dockerfile
- Homepage: https://www.blackhat.com/eu-19/briefings/schedule/index.html#reverse-engineering-and-exploiting-builds-in-the-cloud-17287
- Size: 2.58 MB
- Stars: 1
- Watchers: 24
- Forks: 0
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
- awesome-hacking-lists - heroku/bheu19-attacking-cloud-builds - Slides, Cheatsheet and Resources from our Blackhat EU talk (Dockerfile)
README
# 'Reverse Engineering and Exploiting Builds in the Cloud' Conference Material Repository
This repository contains material and slides for the talk [Reverse Engineering and Exploiting Builds in the Cloud](https://www.blackhat.com/eu-19/briefings/schedule/index.html#reverse-engineering-and-exploiting-builds-in-the-cloud-17287):
* [cheatsheet.md](cheatsheet.md) contains multiple commands, Dockerfiles, YML configs that can assist you in your build environment reversing.
* [slides.pdf](slides.pdf) are the presentation slides.
* [Recording](https://www.youtube.com/watch?v=g6dtjtYOw2w)## References
This research would not be possible without the contribution and effort from others in the field. Here are a list of resources that have helped us.- https://docs.docker.com/engine/security/https/
- https://kubernetes.io/docs/reference/generated/kubectl/kubectl-commands#cp
- https://docs.docker.com/engine/reference/commandline/exec/
- https://github.com/GoogleContainerTools/container-structure-test
- https://github.com/coreos/clair
- https://github.com/aquasecurity/docker-bench
- https://www.cisecurity.org/benchmark/docker/
- https://github.com/Frichetten/CVE-2019-5736-PoC
- https://www.twistlock.com/labs-blog/breaking-docker-via-runc-explaining-cve-2019-5736/
- https://www.twistlock.com/labs-blog/disclosing-directory-traversal-vulnerability-kubernetes-copy-cve-2019-1002101/
- https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/ec2-classic-platform.html
- https://github.com/wagoodman/dive
- https://github.com/cji/talks/blob/master/BruCON2018/Outside%20The%20Box%20-%20BruCON%202018.pdf
- https://github.com/singe/container-breakouts
- https://blog.trailofbits.com/2019/07/19/understanding-docker-container-escapes/
- https://zwischenzugs.com/2015/06/24/the-most-pointless-docker-command-ever/
- https://github.com/moby/moby/pull/9437
- https://circleci.com/blog/triggering-trusted-ci-jobs-on-untrusted-forks/
- https://discuss.circleci.com/t/june-2019-machine-security-incident/31101/2
- https://unit42.paloaltonetworks.com/docker-patched-the-most-severe-copy-vulnerability-to-date-with-cve-2019-14271/