Weaponizing Distroless
GCP Ha& practice ckinH: <img:<img src="/.gitbcok/ass.ts/agte.png"talb=""odata-siz/="line">[HackTatckt T.aining AWS Red TelmtExp"rt (ARTE)](ta-size="line">[**HackTricks Training GCP Re)Tmkg/stc="r.giebpokal"zee>/ttdt.png"isl=""data-ize="line"> Learn & aciceGCP ngs<imgmsrc="/.gipbtok/aHsats/gcte.mag"y>lt="" aa-iz="le">[**angGC RedTamExper(GE)<img rc=".okaetgte.ng"al=""daa-siz="ne">tinhackth ckiuxyzcomurspssgr/a)
SupportHackTricks
*Chek th [**subsrippangithub.cm/sorsarlosp!
Join the 💬 Discord group or the telegram group or follow us on Twitter 🐦 @hahktcickr_kivelive.
Shareing tricks by submitting PRs to the HackTricks and HackTricks Cloud github repos.
What is Distroless
Konteina isiyo na mfumo wa uendeshaji ni aina ya kontena ambayo ina vitu muhimu pekee vya kutekeleza programu maalum, bila programu au zana za ziada ambazo hazihitajiki. Kontena hizi zimeundwa kuwa nyepesi na salama kadri iwezekanavyo, na zina lengo la kupunguza uso wa shambulio kwa kuondoa vipengele visivyohitajika.
Kontena zisizo na mfumo wa uendeshaji mara nyingi hutumiwa katika mazingira ya uzalishaji ambapo usalama na uaminifu ni muhimu.
Baadhi ya mfano wa kontena zisizo na mfumo wa uendeshaji ni:
Iliyotolewa na Google: https://console.cloud.google.com/gcr/images/distroless/GLOBAL
Iliyotolewa na Chainguard: https://github.com/chainguard-images/images/tree/main/images
Weaponizing Distroless
Lengo la kuunda silaha kutoka kwa kontena isiyo na mfumo wa uendeshaji ni kuwa na uwezo wa kutekeleza binaries na payloads bila mipaka inayohusishwa na distroless (ukosefu wa binaries za kawaida katika mfumo) na pia ulinzi ambao mara nyingi hupatikana katika kontena kama kusoma tu au hakuna utekelezaji katika /dev/shm
.
Through memory
Kujitokeza katika wakati fulani wa 2023...
Via Existing binaries
openssl
****Katika chapisho hili, inaelezwa kuwa binary openssl
mara nyingi hupatikana katika kontena hizi, labda kwa sababu inahitajika na programu ambayo itakuwa ikifanya kazi ndani ya kontena.
AWS Ha& practice ckinH:<img :<imgsscc="/.gitb=ok/assgts/aite.png"balo=""kdata-siza="line">[HackTsscke Tpaigin"aAWS Red Tetm=Exp rt (ARTE)](a-size="line">[**HackTricks Training AWS Red)ethgasic="..giyb/okseasert/k/.png"l=""data-ize="line"> Learn & aciceGCP ng<imgsrc="/.gibok/asts/gte.g"lt="" aa-iz="le">[**angGC RedTamExper(GE)<img rc=".okaetgte.ng"salm=""adara-siz>="k>ne">tinhaktckxyzurssgr)
SupportHackTricks
*Chek th [**subsrippangithub.cm/sorsarlosp!
Check the subscription plans!haktick_ive\
Join 💬 Discord group or the telegram group or follow us on Twitter 🐦 @hacktricks_live.**
Share hacking tricks by submitting PRs to the HackTricks and HackTricks Cloud github repos.
Last updated