YoVDO

Docker for Pentesting & Bug Bounty Hunting

Offered By: HackerSploit via YouTube

Tags

Penetration Testing Courses DevOps Courses Docker Courses Kali Linux Courses Web Application Security Courses OWASP Juice Shop Courses

Course Description

Overview

Explore Docker's potential for pentesting and bug bounty hunting in this 39-minute conference talk from DEF CON DC9111. Learn about Docker's importance, advantages, and installation process. Discover how to set up Kali Linux, OWASP Juice Shop, and Bug Bounty Toolkit using Docker containers. Gain insights into Docker images, running containers, and installing essential tools. Understand Docker's role in DevOps and its application for vulnerable web applications. Access provided links to relevant GitHub repositories and Docker Hub images to enhance your cybersecurity toolkit.

Syllabus

Introduction
What is Docker
Advantages
Installing Docker
Docker Images
docker run
list containers
install tools
parrotos
bug bounty toolkit
Docker in DevOps
Docker for vulnerable web applications


Taught by

HackerSploit

Related Courses

Complete Website Ethical Hacking and Penetration Testing
Udemy
Web App Penetration Testing Tutorials
HackerSploit via YouTube
Beginner Bug Bounty Course - Web Application Hacking
YouTube
Working with Developers for Fun and Progress
OWASP Foundation via YouTube
Web App Penetration Testing - CSRF (Cross Site Request Forgery)
HackerSploit via YouTube