Docker (Scenario 7)
Attacker Steps:
Attacker enumerates subdomains of corporate domain-zone(T1590.002,T1591)
Attacker scans Host with smtp-enum(T1589.002)
Attacker brute-forces imap using the already enumerated username(T1078.002,T1110.001,T1133)
Attacker connects to webport to find out about nextcloud(T1592.002)
Attacker exploits nextcloud using a compromised acccount(T1586) which runs inside a container(T1190,T1059.004,T1095)
Attacker discovers user-id(T1033)
Attacker asks exposed docker-daemon for running containers(T1057)
Attacker discovers docker-networks using the exposed docker-daemon(T1016)
Attacker breaks out using exposed docker-daemon-api and schedules execution of sliver-malware(T1610,T1525,T1053.003,T1210)
Attacker uses sliver to list files after container-escape(T1083)
Attacker uses sliver to list processes after container-escape(T1057)
Attacker uses sliver to dump /etc/shadow credentials(T1003.008,T1041)