I got the chance to get access to a list of open container registries. I took this list as an input and downloaded all images, extracted and verified found secrets and performed some statistics on the data. This article describes my approach and summarizes the results. ...
Link-Write Attack: A sweet combination
I’ve recently been working on some exciting development projects, including a deep dive into archive extraction. During this work, I discovered some fascinating behaviours that I’m thrilled to share with you in the following sections. ...
Pentesting Cloud Sandboxes in the wild
Matthias and I talked about cloud sandboxes on virtual BSides Munich 2020. This blogpost summarizes the content of the talk. ...
Container Breakouts – Part 3: Docker Socket
This post is part of a series and shows container breakout techniques that can be performed if a container is started with a mounted Docker socket inside the container. ...
Container Breakouts – Part 2: Privileged Container
This post is part of a series and shows container breakout techniques that can be performed if a container is started privileged. ...