Exposed Docker Registry Penetration Testing
Port: 5000 (Usually)
Tool: https://github.com/Syzik/DockerRegistryGrabber
Usage:
TIP: We use -U and -P as well as -A flags to perform authenticated enumeration and dumping
python3 drg.py http://TARGET.COM --list (List repositories)
python3 drg.py http://TARGET.COM --dump TARGET_REPOSITORY (Dump this repository)
python3 drg.py http://TARGET.COM --dump-all (Dump the entire registry)Authenticated Usage example:
python3 drg.py https://TARGET.COM -A 'Auth BEARER TOKEN' --list (Authenticate with an auth token)
python3 drg.py https://TARGET.COM -U USERNAME -P PASSWORD --list (Authenticate with credentials)Alternative tool: cURL
Usage:
OR
Last updated