RedTeamGuides

RedTeamGuides

100 Methods for Container Attacks

Reza's avatar
Reza
Jan 26, 2025
∙ Paid
Share

Insecure Container Images

  1. Using Trivy:

trivy -q -f json <container_name>:<tag> | jq '.[] | select(.Vulnerabilities != null)'

This command uses Trivy, a vulnerability scanner for containers, to scan a specific container image (<container_name>:<tag>) for vulnerabilities. The -q flag suppresses the output, and the -f json flag formats the output as JSON.

The…

Keep reading with a 7-day free trial

Subscribe to RedTeamGuides to keep reading this post and get 7 days of free access to the full post archives.

Already a paid subscriber? Sign in
© 2025 RedTeamGuides
Privacy ∙ Terms ∙ Collection notice
Start your SubstackGet the app
Substack is the home for great culture