Through the analysis of Docker Remote API Unauthorized Access Vulnerability, this paper proposes a vulnerability exploitation tool. The tool fills the gap of vulnerability detection tools and provides the batch testing function. It achieves high efficiency of vulnerability detection and lays the foundation for web security work such as bug fixes. It is effective and has low cost for the improvement of web security.
1 2017 internet security threat report. https://www.symantec. com/security-center/threat-report.
2 Yeo J. Using penetration testing to enhance your company's security. Computer Fraud & Security, 2013, 2013(4):17-20.
3 Docker, Inc. What is Docker. http://www.docker.com/whatisdocker.[2015-01-29].
4 Seo KT, Hwang HS, Moon IY, et al. Performance comparison analysis of Linux container and virtual machine for building cloud. Advanced Science and Technology Letters, 2014, 66:105-111.
5 Docker, Inc. Understand what are the major Docker components. https://docs.docker.com/introduction/understanding-docker.[2015-03-21].