hacktricks/linux-hardening/privilege-escalation/docker-security/weaponizing-distroless.md
Carlos Polop 5464f2ca37 a
2024-07-29 10:38:48 +02:00

3.7 KiB

Weaponizing Distroless

{% hint style="success" %} Learn & practice AWS Hacking:HackTricks Training AWS Red Team Expert (ARTE)
Learn & practice GCP Hacking: HackTricks Training GCP Red Team Expert (GRTE)

Support HackTricks
{% endhint %}

What is Distroless

A distroless container is a type of container that contains only the necessary dependencies to run a specific application, without any additional software or tools that are not required. These containers are designed to be as lightweight and secure as possible, and they aim to minimize the attack surface by removing any unnecessary components.

Distroless containers are often used in production environments where security and reliability are paramount.

Some examples of distroless containers are:

Weaponizing Distroless

The goal of weaponize a distroless container is to be able to execute arbitrary binaries and payloads even with the limitations implied by distroless (lack of common binaries in the system) and also protections commonly found in containers such as read-only or no-execute in /dev/shm.

Through memory

Coming at some point of 2023...

Via Existing binaries

openssl

****In this post, it is explained that the binary openssl is frequently found in these containers, potentially because it's needed by the software that is going to be running inside the container.

{% hint style="success" %} Learn & practice AWS Hacking:HackTricks Training AWS Red Team Expert (ARTE)
Learn & practice GCP Hacking: HackTricks Training GCP Red Team Expert (GRTE)

Support HackTricks
{% endhint %}