2 / 1 / 2025
TASK 01: DOCKER
Docker is a containerization platform that allows developers to package, ship, and run applications in containers.
Docker Architecture
The Docker architecture consists of:
- Docker Engine: The Docker Engine is the runtime environment for containers. It provides a lightweight and portable way to run containers.
- Docker Hub: Docker Hub is a registry for Docker images. It provides a centralized location for users to share and manage their images.
- Docker Images: Docker images are templates for creating containers. They contain the application code, libraries, and dependencies required to run the application.
- Docker Containers: Docker containers are runtime instances of Docker images. They provide a isolated environment for running applications.
Key Benefits of Docker
Some of the key benefits of Docker include:
- Lightweight: Containers are much lighter than VMs, making them faster to spin up and down.
- Portable: Docker containers are highly portable and can run on any system that supports Docker, without requiring a specific environment or dependencies.
- Isolated: Containers provide a high level of isolation between applications, making it easier to manage and secure them.
- Efficient: Docker containers can help reduce infrastructure costs by allowing multiple applications to run on the same host, without the need for multiple VMs.
TASK 2: DOCKERFILE SPYWARE
A Dockerfile spyware would be a Dockerfile (a text file containing instructions for building a Docker image) that is designed to create a Docker image that contains spyware.
In other words, it's a recipe for building a Docker container that would secretly monitor and collect sensitive information from the host system or other containers, without the user's knowledge or consent.
TASK 3: HASHING
Hashing is a process that takes input data (like a book title) and generates a unique fixed-length code, called a hash value or digest. This hash value represents the original data.
Here's how it works:
- You input data
- A hashing algorithm processes the data.
- The algorithm generates a unique hash value (a code).
- This hash value is stored or used for later reference.
Hashing is useful for:
- Data integrity: Hash values ensure data isn't tampered with or altered.
- Data storage: Hash values help quickly identify and retrieve data.
- Password security: Hash values are used to store passwords securely.
- Digital signatures: Hash values verify the authenticity of digital documents
TASK 4: NMap
Nmap (Network Mapper) is a free, open-source network scanning and exploration tool used to discover hosts, services, and operating systems on a computer network.
Nmap sends specially crafted packets to target hosts and analyzes the responses to gather information about:
- Host discovery: Identifying active hosts on a network.
- Port scanning: Detecting open ports and services running on a host.
- OS detection: Identifying the operating system and its version.
- Service version detection: Identifying the version of services running on a host.
Nmap is commonly used for:
- Network inventory and asset management
- Vulnerability scanning and assessment
- Penetration testing and security auditing
- Troubleshooting network connectivity issues