๐ณ Docker - How It Works ๐ณ
Docker is a containerization platform that lets you package your app and all its dependencies into lightweight, portable containers.
Each container runs on the same Docker Engine, sharing the OS kernel but staying completely isolated - with its own filesystem, processes, and network.
๐น Core Components:
๐งฉ Image - a blueprint containing code, libraries, and configs.
๐ฆ Container - a running instance of that image.
โ๏ธ Docker Engine - runs and manages containers.
โ๏ธ Docker Hub - the global registry for sharing images.
๐ก Philosophy:
#docker #containerization
Docker is a containerization platform that lets you package your app and all its dependencies into lightweight, portable containers.
Each container runs on the same Docker Engine, sharing the OS kernel but staying completely isolated - with its own filesystem, processes, and network.
๐น Core Components:
๐งฉ Image - a blueprint containing code, libraries, and configs.
๐ฆ Container - a running instance of that image.
โ๏ธ Docker Engine - runs and manages containers.
โ๏ธ Docker Hub - the global registry for sharing images.
๐ก Philosophy:
โIf it works on my machine - it works everywhere.โ
#docker #containerization
๐ฅ3
Docker Security - Quick Guide ๐
Keeping your containers secure means minimizing attack surface, scanning for vulnerabilities, and enforcing runtime policies.
๐ง Essential Practices:
๐ธ Run container as non-root
๐ธ Scan Docker image for vulnerabilities
๐ธ Apply default seccomp security profile
๐งฐ Top 3 Docker Security Tools:
Trivy
๐น All-in-one vulnerability scanner for container images, OS packages, and IaC.
Docker Bench for Security
๐น Automated script to check for common Docker security best practices.
Cosign
๐น Tool for signing and verifying container images to ensure integrity and trust:
Key takeaway:
๐ Always scan, sign, and sandbox - secure containers start with secure images.
#docker #containerization #security
Keeping your containers secure means minimizing attack surface, scanning for vulnerabilities, and enforcing runtime policies.
๐ง Essential Practices:
๐ธ Run container as non-root
docker run --user 1000:1000 nginx:latest
๐ธ Scan Docker image for vulnerabilities
docker scan myimage:latest
๐ธ Apply default seccomp security profile
docker run --security-opt seccomp=default.json myimage
๐งฐ Top 3 Docker Security Tools:
Trivy
๐น All-in-one vulnerability scanner for container images, OS packages, and IaC.
Docker Bench for Security
๐น Automated script to check for common Docker security best practices.
Cosign
๐น Tool for signing and verifying container images to ensure integrity and trust:
Key takeaway:
๐ Always scan, sign, and sandbox - secure containers start with secure images.
#docker #containerization #security
๐3๐ฅ1
โ ๏ธ CVE-2025-24813 Apache Tomcat as Actively Exploited with 9.8 CVSS โ ๏ธ
๐ฅ PoC: https://github.com/brs6412/CVE-2025-24813
๐ฏ 6.7m+ Results are found on the https://en.fofa.info nearly year.
๐ FOFA Link: https://en.fofa.info/result?qbase64=YXBwPSJBUEFDSEUtVG9tY2F0Ig%3D%3D
FOFA Query:app="APACHE-Tomcat"
๐ Refer: https://securityonline.info/cisa-flags-apache-tomcat-cve-2025-24813-as-actively-exploited-with-9-8-cvss/
#OSINT #FOFA #CyberSecurity #Vulnerability
๐ฅ PoC: https://github.com/brs6412/CVE-2025-24813
๐ฏ 6.7m+ Results are found on the https://en.fofa.info nearly year.
๐ FOFA Link: https://en.fofa.info/result?qbase64=YXBwPSJBUEFDSEUtVG9tY2F0Ig%3D%3D
FOFA Query:app="APACHE-Tomcat"
๐ Refer: https://securityonline.info/cisa-flags-apache-tomcat-cve-2025-24813-as-actively-exploited-with-9-8-cvss/
#OSINT #FOFA #CyberSecurity #Vulnerability
๐ฅ3
๐จ CVE-2025-22167 (CVSS 8.7): Jira Path Traversal flaw allows arbitrary file writes to any JVM-writable path. Possible RCE when chained with other exploits. ๐จ
Search by vul.cve Filter: ๐ vul.cve="CVE-2025-22167"
ZoomEye Dork: ๐ app="Atlassian JIRA"
Over 107k vulnerable instances.
ZoomEye Link: Here
Refer:
1. https://jira.atlassian.com/browse/JSDSERVER-16409
2. https://hub.zoomeye.ai/detail/68f99417ad32f0b8765c0a99
#ZoomEye #cybersecurity #infosec #OSINT
Search by vul.cve Filter: ๐ vul.cve="CVE-2025-22167"
ZoomEye Dork: ๐ app="Atlassian JIRA"
Over 107k vulnerable instances.
ZoomEye Link: Here
Refer:
1. https://jira.atlassian.com/browse/JSDSERVER-16409
2. https://hub.zoomeye.ai/detail/68f99417ad32f0b8765c0a99
#ZoomEye #cybersecurity #infosec #OSINT
๐ฅ2
The best way to learn Web Cache Deception is through this learning path. ๐
You'll learn to spot discrepancies in how origin servers and caches handle requests and then leverage these differences to create path confusion.
You'll learn:
๐ถ Identifying web caches
๐ถ How to construct a web cache deception attack
๐ถ How to exploit cache rules
๐ถ Leveraging path mapping and delimiter discrepancies
๐ถ Preventing web cache deception vulnerabilities
Get Started: ๐ Here
You'll learn to spot discrepancies in how origin servers and caches handle requests and then leverage these differences to create path confusion.
You'll learn:
๐ถ Identifying web caches
๐ถ How to construct a web cache deception attack
๐ถ How to exploit cache rules
๐ถ Leveraging path mapping and delimiter discrepancies
๐ถ Preventing web cache deception vulnerabilities
Get Started: ๐ Here
๐1๐ฅ1
โ ๏ธ Web Cache Poisoning โ ๏ธ - is an attack where a hacker manipulates HTTP requests to store malicious or incorrect content in a web cache or CDN.
๐ As a result, all users who later access the cached page receive the poisoned version, potentially leading to mass XSS, phishing, or content manipulation.
๐ Read more about: Here
๐ As a result, all users who later access the cached page receive the poisoned version, potentially leading to mass XSS, phishing, or content manipulation.
๐ Read more about: Here
โ1โค1
๐ ๏ธ SSH Tunnels: Port Forwarding on Steroids ๐ ๏ธ
๐ธ A short Cheat Sheet to help you understand SSH tunneling.
#ssh_tunneling #pentest #red_team
๐ธ A short Cheat Sheet to help you understand SSH tunneling.
#ssh_tunneling #pentest #red_team
โค1โ1
โ ๏ธ Evading Elastic Security - Deep dive into bypassing detections through string obfuscation, symbol randomization, XOR-encoded fragments & behavioral evasion techniques. โ ๏ธ
Here ๐ https://matheuzsecurity.github.io/hacking/bypassing-elastic
#infosec #redteam #linux #rootkit #elastic #malware
Here ๐ https://matheuzsecurity.github.io/hacking/bypassing-elastic
#infosec #redteam #linux #rootkit #elastic #malware
๐ฅ2
๐งจ The Top 10 Most Dangerous Web3 Vulnerabilities Right Now ๐งจ
๐ธ Access Control Vulnerabilities
๐ธ Price Oracle Manipulation
๐ธ Logic Errors
๐ธ Lack of Input Validation
๐ธ Reentrancy Attacks
๐ธ Unchecked External Calls
๐ธ Flash Loan Attacks
๐ธ Integer Overflow and Underflow
๐ธ Insecure Randomness
๐ธ Denial of Service (DoS) Attacks
Details: ๐ Here
๐ธ Access Control Vulnerabilities
๐ธ Price Oracle Manipulation
๐ธ Logic Errors
๐ธ Lack of Input Validation
๐ธ Reentrancy Attacks
๐ธ Unchecked External Calls
๐ธ Flash Loan Attacks
๐ธ Integer Overflow and Underflow
๐ธ Insecure Randomness
๐ธ Denial of Service (DoS) Attacks
Details: ๐ Here
๐ฏ2๐คก1
โ ๏ธ How To Secure A Linux Server. โ ๏ธ
This guides purpose is to teach you how to secure a Linux server.
There are a lot of things you can do to secure a Linux server and this guide will attempt to cover as many of them as possible.
๐ Read more - Here ๐
#info_sec #linux #hardening
This guides purpose is to teach you how to secure a Linux server.
There are a lot of things you can do to secure a Linux server and this guide will attempt to cover as many of them as possible.
๐ Read more - Here ๐
#info_sec #linux #hardening
๐2
Host-Pulse - a fast, lightweight domain liveness probe for pentesters and security engineers.
Scans large domain lists, quickly skips dead targets, detects reachable hosts (including 403/401/5xx), and produces clean
Tool: ๐ https://github.com/xV4nd3Rx/Host-Pulse
โก Fast-skip dead targets.
๐ฏ Alive logic tuned for pentesting
๐งฉ Randomized User-Agent per request to avoid simple UA-based filtering.
๐ Parallel workers + controlled delays
๐ Insecure HTTPS requests are supported (suppressed warnings) so scanning continues even with untrusted certs
#pentest_tools #Red_Team #cybersecurity #Passive_Recon
Scans large domain lists, quickly skips dead targets, detects reachable hosts (including 403/401/5xx), and produces clean
alive.txt and compact results.csv reports.Tool: ๐ https://github.com/xV4nd3Rx/Host-Pulse
โก Fast-skip dead targets.
๐ฏ Alive logic tuned for pentesting
๐งฉ Randomized User-Agent per request to avoid simple UA-based filtering.
๐ Parallel workers + controlled delays
๐ Insecure HTTPS requests are supported (suppressed warnings) so scanning continues even with untrusted certs
#pentest_tools #Red_Team #cybersecurity #Passive_Recon
๐ฅ2
๐ I believe the Telegram channel should bring real value to subscribers. ๐
๐ฅ New column for Monday: Job Offers. ๐ฅ
๐ฌ For details, please contact me via direct: @V4nd3R ๐ฌ
#cybersecurity_career #job_offers #security
๐ฅ New column for Monday: Job Offers. ๐ฅ
As a Senior Security Engineer, become part of a cross-functional development team engineering experiences of tomorrow. We are seeking a highly skilled and motivated Senior Security & Penetration Tester.
In this role, you will be responsible for identifying and mitigating security vulnerabilities in a project in the biomedicine field. You will proactively test our applications, including infrastructure, ensuring our digital assets are secure against emerging threats.
๐ฌ For details, please contact me via direct: @V4nd3R ๐ฌ
#cybersecurity_career #job_offers #security
โ2
๐ฅ SPF Attacks: Quick Overview
1๏ธโฃ Alignment Bypass
SPF checks MAIL FROM, not the visible From - easy spoofing.
2๏ธโฃ SoftFail Abuse
~all / ?all often deliver anyway.
3๏ธโฃ Lookalike Domains
Fake domains with valid SPF look legit.
4๏ธโฃ DNS Poisoning (no DNSSEC)
SPF TXT records can be spoofed.
5๏ธโฃ Macro Abuse
Macros leak info or behave unpredictably.
6๏ธโฃ Oversized SPF
>10 lookups โ PermError โ sometimes treated as pass.
7๏ธโฃ Subdomain Takeover / Abuse
Forgotten subdomains with weak policies.
8๏ธโฃ Trusted Sender Hijack
Compromised authorized mail services = SPF pass.
๐ก Takeaway
SPF alone is weak. Use DKIM + DMARC enforcement.
1๏ธโฃ Alignment Bypass
SPF checks MAIL FROM, not the visible From - easy spoofing.
2๏ธโฃ SoftFail Abuse
~all / ?all often deliver anyway.
3๏ธโฃ Lookalike Domains
Fake domains with valid SPF look legit.
4๏ธโฃ DNS Poisoning (no DNSSEC)
SPF TXT records can be spoofed.
5๏ธโฃ Macro Abuse
Macros leak info or behave unpredictably.
6๏ธโฃ Oversized SPF
>10 lookups โ PermError โ sometimes treated as pass.
7๏ธโฃ Subdomain Takeover / Abuse
Forgotten subdomains with weak policies.
8๏ธโฃ Trusted Sender Hijack
Compromised authorized mail services = SPF pass.
๐ก Takeaway
SPF alone is weak. Use DKIM + DMARC enforcement.
๐ฅ2๐1
๐จ 110+ Splunk Queries for SOC Analysts โก
Collection of real-world detection queries a goldmine for SOC analysts, threat hunters, and blue teamers.
#SOC #Blue_Team #security
Collection of real-world detection queries a goldmine for SOC analysts, threat hunters, and blue teamers.
#SOC #Blue_Team #security
๐ฅ4