Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Will docker let us pwn the network ? #13

Open
tux-mind opened this issue Feb 12, 2017 · 1 comment
Open

Will docker let us pwn the network ? #13

tux-mind opened this issue Feb 12, 2017 · 1 comment
Assignees
Milestone

Comments

@tux-mind
Copy link
Member

The usage of Docker is a very good idea, users and testers do not have to install a single package, just to start our container. No more bugs for edge cases software versions ( like the rm tool that do not accept the -rf option 😓 ).

But I wonder if it still allow us to do our jobs right: can we put devices in monitor mode, sniff wifi packets, perform ARP poisoning... ??

From a quick search I found that by using pipework --direct-phys eth1 $CONTAINERID 192.168.1.2/24 we can assign a physical network interface to our container, but I'm in doubt about this approach as it can create troubles to other programs that uses that interface.

@developpsoft can you play a little with Docker ? finding out if aircrack, nmap, arppoison and all our loved tools works fine ?

Thank you in advance for your contributions, I'll assign this issue to a note on the cSploit core project.

@tux-mind tux-mind added this to the 2.0.0 milestone Feb 12, 2017
@tux-mind tux-mind changed the title Will docker let us pawn the network ? Will docker let us pwn the network ? Feb 13, 2017
@ETeissonniere
Copy link
Member

@tux-mind, users should use --privileged, and --net=host, it will let them run nmap, play with raw sockets etc...

From the official doc:

When the operator executes docker run --privileged, Docker will enable to access to all devices on the host as well as set some configuration in AppArmor or SELinux to allow the container nearly all the same access to the host as processes running outside containers on the host. Additional information about running with --privileged is available on the Docker Blog.

The --net=host option will allow the container to access host's network devices.

Please note users should disable monitor mode before exiting the container.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants