February 2018
Intermediate to advanced
396 pages
9h 38m
English
In the previous sections, we discovered the power of Docker containers and learned how to defend against Docker exploitation techniques. Let's move on to another aspect of Docker containers. In this section, you will learn how to build a penetration testing laboratory based on a Dockernized environment.
We started our learning process using Kali Linux distribution, so we will use the same distribution as a demonstration.
First, let's clone a Kali Linux container file from GitHub, using the git clone command:
git clone https://github.com/offensive-security/kali-linux-docker.git

Open the Dockerfile and ...
Read now
Unlock full access