We all are aware that with the new development of docker it is no longer necessary to use a virtual machine for many things due to the ease and speed that docker offers. In this article we will see some basic concepts and the way of use docker.
Docker is designed for the world of software developers, so you can create an application that can run on any operating system and in addition to that it facilitates the deployment of it.
- Docker installation for Linux
- Docker installation for Windows
Open a command-line terminal like PowerShell, and try out some Docker commands!
In the following you can find many interesting images https://hub.docker.com/, I will list some interesting ones that we will be seeing further.
Docker Images for Penetration Testing
docker pull kalilinux/kali-linux-docker official Kali Linux
docker pull owasp/zap2docker-stable – official OWASP ZAP
docker pull wpscanteam/wpscan – official WPScan
docker pull pandrew/metasploit – docker-metasploit
docker pull citizenstig/dvwa – Damn Vulnerable Web Application (DVWA)
docker pull wpscanteam/vulnerablewordpress – Vulnerable WordPress Installation
docker pull hmlio/vaas-cve-2014-0160 – Vulnerability as a service: Heartbleed
docker pull opendns/security-ninjas – Security Ninjas
docker pull usertaken/archlinux-pentest-lxde – Arch Linux Penetration Tester
docker pull diogomonica/docker-bench-security – Docker Bench for Security
docker pull ismisepaul/securityshepherd – OWASP Security Shepherd
docker pull danmx/docker-owasp-webgoat – OWASP WebGoat Project docker image
docker-compose build && docker-compose up – OWASP NodeGoat
docker pull citizenstig/nowasp – OWASP Mutillidae II Web Pen-Test Practice Application