In the previous sections, we discovered the power of Docker containers and learned how to defend against Docker exploitation techniques. Let's move on to another aspect of Docker containers. In this section, you will learn how to build a penetration testing laboratory based on a Dockernized environment.
We started our learning process using Kali Linux distribution, so we will use the same distribution as a demonstration.
First, let's clone a Kali Linux container file from GitHub, using the git clone command:
git clone https://github.com/offensive-security/kali-linux-docker.git
Open the Dockerfile and ...