Container breakout
We have access to the container's shell through the Meterpreter session and through that session, we can talk to other application containers hosted on the same machine. In the earlier Nmap scan of the Docker network, the 8022
service also stood out from the rest. As attackers, services with ports in the 8000
range are always interesting because underprotected development web servers can be found there. This particular port could be an exploitable web application and may give us more access than we currently have.
The Nmap scan report for the content_ssh_1
container also had the SSH port open, but this service is typically harder to exploit, short of brute-forcing for weak credentials:
Nmap scan report for content_ssh_1.content_default (172.18.0.2) Host is up (0.00056s latency). Not shown: 65534 closed ports PORT STATE SERVICE 22/tcp open ssh 8022/tcp open unknown
If we go back and drop into a shell on the compromised container, we can execute a quick curl
...