Docker and Kubernetes pentesting techniques in AWS
In the previous chapter, I walked you through using Prowler to pentest AWS deployments. I’ll show you some scripts and vulnerability checks you can execute to find Docker and Kubernetes vulnerabilities with a few different tools. But first, it’s worthwhile mentioning here that Prowler can be executed from a Docker instance! You can use Prowler from Docker containers to help pentest your organization’s entire AWS network. Running Prowler from Docker isn’t just for vulnerability assessing Docker.
The same Prowler CLI commands from the previous chapter can be used when you run Prowler from Docker.
Installation in Docker
Here’s how to install Prowler from Docker:
- Make sure that Docker Desktop is installed on your local computer. Find the Docker Desktop Windows, Mac, and Linux clients here: https://docs.docker.com/get-docker/.
- Have your AWS credentials ready. You can verify them by...