February 2018
Intermediate to advanced
396 pages
9h 38m
English
After learning how to exploit and defend Active Directory, let's continue our journey. This chapter will walk you through the different aspects of Docker containers. In this chapter, we will cover the basics from installing and configuring Docker to exploiting it. You will also get a glimpse of the power of Docker containers by learning how to build a complete penetration testing laboratory.
The following topics will be covered in this chapter:
Read now
Unlock full access