<?xml version="1.0" encoding="utf-8" standalone="yes" ?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>Docker on mytty</title>
    <link>https://mytty.org/tags/docker/</link>
    <description>Recent content in Docker on mytty</description>
    <generator>Hugo -- gohugo.io</generator>
    <language>en</language>
    <copyright>Except where otherwise noted, content on this site is created by Richard Sammet and&lt;br&gt; licensed under a &lt;a href=http://creativecommons.org/licenses/by/4.0/&gt;Creative Commons Attribution 4.0 International License&lt;/a&gt;.</copyright>
    <lastBuildDate>Thu, 15 Aug 2019 17:42:42 +0000</lastBuildDate>
    
	<atom:link href="https://mytty.org/tags/docker/index.xml" rel="self" type="application/rss+xml" />
    
    
    <item>
      <title>TYS 0x07 - onebyte to rule them all</title>
      <link>https://mytty.org/posts/tys_0x07_onebyte/</link>
      <pubDate>Thu, 15 Aug 2019 17:42:42 +0000</pubDate>
      
      <guid>https://mytty.org/posts/tys_0x07_onebyte/</guid>
      <description>&lt;blockquote&gt;
&lt;p&gt;This post is part of the Test Your Skills series. You can find an introduction &lt;a href=&#34;https://mytty.org/projects/tys/&#34;&gt;here&lt;/a&gt;. And an overview of all TYS&amp;rsquo;s currently available is over &lt;a href=&#34;https://mytty.org/tags/tys/&#34;&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;hr /&gt;

&lt;h4 id=&#34;challenge&#34;&gt;Challenge&lt;/h4&gt;

&lt;p&gt;The goal of this challenge is to write a script/tool/exploit which successfully bypasses the login of the network enabled service running in the provided docker container - without changing the docker run command (run it exactly the way as shown below) or any of the scripts/files provided.
Feel free to explore the container and take a closer look at the application binary.&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>TYS 0x06 - willItBounce</title>
      <link>https://mytty.org/posts/tys_0x06_willitbounce/</link>
      <pubDate>Fri, 02 Aug 2019 17:50:15 +0000</pubDate>
      
      <guid>https://mytty.org/posts/tys_0x06_willitbounce/</guid>
      <description>&lt;blockquote&gt;
&lt;p&gt;This post is part of the Test Your Skills series. You can find an introduction &lt;a href=&#34;https://mytty.org/projects/tys/&#34;&gt;here&lt;/a&gt;. And an overview of all TYS&amp;rsquo;s currently available is over &lt;a href=&#34;https://mytty.org/tags/tys/&#34;&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;hr /&gt;

&lt;h4 id=&#34;challenge&#34;&gt;Challenge&lt;/h4&gt;

&lt;p&gt;The goal of this challenge is to find a way to send a specific input from your host to the &amp;ldquo;Hidden Service&amp;rdquo; inside the container (as illustrated by the red arrow) - without changing the docker run command (build and run it exactly the way as shown below) or any of the scripts/files provided.&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>TYS 0x05 - open sesame</title>
      <link>https://mytty.org/posts/tys_0x05_open_sesame/</link>
      <pubDate>Mon, 27 May 2019 07:50:15 +0000</pubDate>
      
      <guid>https://mytty.org/posts/tys_0x05_open_sesame/</guid>
      <description>&lt;blockquote&gt;
&lt;p&gt;This post is part of the Test Your Skills series. You can find an introduction &lt;a href=&#34;https://mytty.org/projects/tys/&#34;&gt;here&lt;/a&gt;. And an overview of all TYS&amp;rsquo;s currently available is over &lt;a href=&#34;https://mytty.org/tags/tys/&#34;&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;hr /&gt;

&lt;h4 id=&#34;challenge&#34;&gt;Challenge&lt;/h4&gt;

&lt;p&gt;The goal of this challenge is to get your hands on the secret code which itself is hidden behind a secret and a captcha protection! You are allowed use any means necessary - think outside the box!&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>TYS 0x04 - Is it really that easy?!</title>
      <link>https://mytty.org/posts/tys_0x04_is_it_really_that_easy/</link>
      <pubDate>Thu, 16 May 2019 19:02:09 +0000</pubDate>
      
      <guid>https://mytty.org/posts/tys_0x04_is_it_really_that_easy/</guid>
      <description>&lt;blockquote&gt;
&lt;p&gt;This post is part of the Test Your Skills series. You can find an introduction &lt;a href=&#34;https://mytty.org/projects/tys/&#34;&gt;here&lt;/a&gt;. And an overview of all TYS&amp;rsquo;s currently available is over &lt;a href=&#34;https://mytty.org/tags/tys/&#34;&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;hr /&gt;

&lt;h3 id=&#34;challenge&#34;&gt;Challenge&lt;/h3&gt;

&lt;p&gt;Your objective? Get root! But, do it without making any changes to the container/image or the file-system outside your users home directory (/home/void) and do not change the docker run command (run it the way shown below)!&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>Hacking a telnetd sensor node on the back of busybox telnetd</title>
      <link>https://mytty.org/posts/telnetd_sensor_node/</link>
      <pubDate>Fri, 03 May 2019 16:30:21 +0000</pubDate>
      
      <guid>https://mytty.org/posts/telnetd_sensor_node/</guid>
      <description>&lt;h3 id=&#34;telnetd-sensor-node-what&#34;&gt;Telnetd sensor node what?!&lt;/h3&gt;

&lt;p&gt;I call it a sensor node (more on that in a later post), you might call it a telnetd &lt;a href=&#34;https://en.wikipedia.org/wiki/Method_stub&#34;&gt;stub&lt;/a&gt;. We are essentially talking about a telnet service which looks like a telnet service, is fingerprinted as a telnet service, replies like a telnet service, but is limited to bare minimal functionality and just meant as a sensor to gather information.&lt;/p&gt;

&lt;p&gt;In this case, we are looking for the folks who are looking for us - or, who are looking for exposed services on the interwebs (or maybe your corp network?).&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>dockerinoz - build containers that won&#39;t haunt you</title>
      <link>https://mytty.org/posts/dockerinoz/</link>
      <pubDate>Sat, 06 Apr 2019 11:32:33 +0000</pubDate>
      
      <guid>https://mytty.org/posts/dockerinoz/</guid>
      <description>&lt;h3 id=&#34;dockerinoz-simple-dockerfile-security-best-practices-verification&#34;&gt;dockerinoz - simple Dockerfile (security) best practices verification&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;dockerinoz&lt;/strong&gt; is a very small and simple tool which allows you to verify the content of Dockerfiles against a given best practice. It&amp;rsquo;s nothing more than a fancy grep using a bit more than just simple regular expressions.
This approach allows for &lt;em&gt;very&lt;/em&gt; quick verifications which is especially important when implementing &lt;strong&gt;dockerinoz&lt;/strong&gt; into your build pipeline. It also makes &lt;strong&gt;dockerinoz&lt;/strong&gt; super easy to modify and extend - especially as the rules are just regular expressions in a json file (rules.json).&lt;/p&gt;</description>
    </item>
    
  </channel>
</rss>