veinmind-backdoor is a backdoor scanning tool for image developed by Chaitin Technology
-
Quicklly scan backdoors in the image
plugin function crontab scan crontab config for backdoors bashrc scan bash startup scripts for backdoors sshd scan for sshd softlink backdoors service scan for malicious system services tcpwrapper scan for tcpwrapper backdoors -
Supports writing backdoor detection scripts in plugin mode
-
Support
containerd
/dockerd
image backdoor scanning
- linux/amd64
- linux/386
- linux/arm64
- linux/arm
-
install
libveinmind
firstlly ,you can click here offical document for more info -
install python dependencies which
veinmind-backdoor
need,execute the command in the project directorycp -r ./veinmind-common ./plugins/python/veinmind-backdoor && rm -rf ./plugins/python/veinmind-backdoor/veinmind-common/go cd ./plugins/python/veinmind-backdoor pip install -r requirements.txt
-
Install by Parallel Container,pull
veinmind-backdoor
iamge and startdocker run --rm -it --mount 'type=bind,source=/,target=/host,readonly,bind-propagation=rslave' veinmind/veinmind-backdoor
-
or start with the script which we provided
chmod +x parallel-container-run.sh && ./parallel-container-run.sh
-
Scan image with specified image name or ID(need to have a corresponding image locally)
python scan.py scan-images [imagename/imageid]
-
Scan all local images
python scan.py scan-images
-
Specify the container runtime type
python scan.py scan-images --containerd
container runtime type
- dockerd
- containerd
-
Specify output type
python scan.py --format [formattype] scan-images
output type
- stdout
- json
-
Specify output path
python scan.py --format json --output /tmp scan-images