RedTeamGuides

RedTeamGuides

100 Methods for Container Attacks

Reza's avatar
Reza
Jan 26, 2025
∙ Paid

Insecure Container Images

  1. Using Trivy:

trivy -q -f json <container_name>:<tag> | jq '.[] | select(.Vulnerabilities != null)'

This command uses Trivy, a vulnerability scanner for containers, to scan a specific container image (<container_name>:<tag>) for vulnerabilities. The -q flag suppresses the output, and the -f json flag formats the output as JSON.

The…

User's avatar

Continue reading this post for free, courtesy of Reza.

Or purchase a paid subscription.
© 2025 RedTeamGuides · Privacy ∙ Terms ∙ Collection notice
Start your SubstackGet the app
Substack is the home for great culture