Latest Stories

Stay up-to-date with everything at Approach

Blog article

Exegol: The Game-Changing Docker-Based Cyber Security Tool

Publication date

13.02.2024

Explore how Exegol revolutionises penetration testing with Docker-based environments, offering customisation, reproducibility, and seamless security workflows.

Introduction

Exegol’s Distinctive Approach

Exegol sets itself apart in the cybersecurity landscape primarily through its innovative use of Docker technology. To do so, Exegol offers to ability to create isolated, and highly reproducible environments, tailored for an array of penetration testing and cybersecurity tasks. The significance of this lies in the consistency it offers – a cornerstone in effective security testing. By using Docker containers, Exegol ensures that each environment is a standalone ecosystem, free from the discrepancies that often plague different systems.

This uniformity provides a common testing ground that is predictable and reliable. This is a feature that is especially beneficial when comparing results across various platforms (with different OS, CPU architecture), or when multiple testers are involved.

For both testers and clients, the uniformity provided by Exegol translates into a shared platform of understanding. It enables replicating security scenarios in a controlled manner, ensuring consistent reproduction and examination of any identified vulnerabilities or security flaws. This aspect is particularly crucial in validating security measures and verifying the effectiveness of patches or updates.

Core Features and Advantages of Exegol

Simplified Operations and Versatile Tools

The Python wrapper is central to Exegol as it simplifies the Docker and git operations, streamlining the user experience. This interface streamlines the process by enabling easy setup, creation, usage, and management of client-specific containers. Users can customize this individual container with a multitude of options.

Figure 1 Starting an Exegol container for pentesting

The wrapper is coupled with Docker images that come pre-loaded with a broad range of tools, up to 368 at the time of writing (https://exegol.readthedocs.io/en/latest/exegol-image/tools.html#tools-list) and configurations, ready for immediate deployment in diverse cybersecurity scenarios. Exegol includes the following pre-existing Docker images: Web, OSINT, light, full, and Nightly, with each customized for a specific task.Exegol also supports tools with a user interface (UI) by using X11 sharing, which allows the use of applications such as BurpSuite, Bloodhound, Wireshark, among others. Although MacOS somewhat compromises this functionality, Exegol offers a workaround by implementing a remote desktop alternative using VNC.

Exegol is not just about powerful tools; it’s also about ease of use. In this regard, Exegol provides a suite of shortcuts to help professionals in their daily jobs:

Shortcut Description
ctrl+q The shortcut can be used to save the half-typed command, look for another value, and then finish the first command.
ctrl + r Look for something in the history
ctrl + t Look for a file or directory with a fuzzy finder

Figure 2 Quick search and select in the history of command

Customization

Furthermore, Exegol demonstrates a commitment to long-term sustainability and reliability. To achieve this, Exegol incorporates a robust CI/CD (Continuous Integration/Continuous Deployment) pipeline alongside comprehensive documentation. This integration is a strategic move that empowers users to not only build upon the existing framework of Exegol, but also to ensure that all tools and their dependencies function as intended.

Figure 3 CICD Tests confirming that the tools function correctly. Although the ones demonstrated are simple, they serve as an initial defense against a flawed environment.

This approach significantly advances over traditional virtualized environments, like those based on Kali Linux, which can sometimes encounter broken or incompatible environments due to untested updates or modifications.

Figure 4 Yes yes we could use VENV, but we have Exegol now

Customization Options in Exegol

Alternatively, Exegol offers a method to customize existing containers through the « My resource » feature. This functionality is based on a straightforward shared volume between the host and all Exegol containers, along with a sophisticated integration within the Exegol images themselves. This feature supports all the following customization:

  • apt (packages, sources, keys)
  • bloodhound (customqueries, config)
  • firefox (addons, CA)
  • python3 (pip3)
  • tmux (conf)
  • vim (vimrc, configs)
  • neovim (.config/nvim)
  • zsh (aliases, zshrc, history)

Accountability, Reproducibility and Trust

Exegol can meticulously log every action, providing a comprehensive record for review and auditing. This feature is invaluable for transparency and compliance, offering a detailed audit trail of the testing process.

Moreover, Exegol guarantees reproducible testing environments, an essential feature for accurate and consistent results. This consistency is key in building trust between pentesters and clients, as it allows for the verification of findings and a deeper understanding of vulnerabilities.

For Mac users, the need to rely on VNC remote desktop is a downside. However, this limitation seems out of the Exegol developer’s control, as this issue originates from XQuartz.

Conclusion

Sources

https://github.com/ThePorgs/Exegol

https://discord.gg/T2fYxDFw

https://exegol.readthedocs.io/en/latest/

https://www.youtube.com/watch?v=lwZCziWpTcA


 

 

OTHER STORIES

Discover how AI-powered website generation enhances red teaming tactics, concealing C2 infrastructure with realistic, dynamic sites that evade detection.
A tiny Raspberry Pi can outsmart NAC security, slip past defences, and exploit IEEE 802.1X vulnerabilities—see how these risks impact your network!
Find out how a tiny yet powerful Raspberry Pi can bypass network security, infiltrate protected systems, and redefine Red Team strategies in cyber security!

Contact us to learn more about our services and solutions

Our team will help you start your journey towards cyber serenity

Do you prefer to send us an email?