Docker for Pentesting & Bug Bounty Hunting
Offered By: HackerSploit via YouTube
Course Description
Overview
Explore Docker's potential for pentesting and bug bounty hunting in this 39-minute conference talk from DEF CON DC9111. Learn about Docker's importance, advantages, and installation process. Discover how to set up Kali Linux, OWASP Juice Shop, and Bug Bounty Toolkit using Docker containers. Gain insights into Docker images, running containers, and installing essential tools. Understand Docker's role in DevOps and its application for vulnerable web applications. Access provided links to relevant GitHub repositories and Docker Hub images to enhance your cybersecurity toolkit.
Syllabus
Introduction
What is Docker
Advantages
Installing Docker
Docker Images
docker run
list containers
install tools
parrotos
bug bounty toolkit
Docker in DevOps
Docker for vulnerable web applications
Taught by
HackerSploit
Related Courses
Cloud Computing Applications, Part 1: Cloud Systems and InfrastructureUniversity of Illinois at Urbana-Champaign via Coursera Introduction to Cloud Infrastructure Technologies
Linux Foundation via edX Introduction aux conteneurs
Microsoft Virtual Academy via OpenClassrooms The Docker for DevOps course: From development to production
Udemy Windows Server 2016: Virtualization
Microsoft via edX