A Docker registry management platform implements the Registry API v2 with enterprise security features for container image storage and distribution. But when authentication mechanisms meet implementation flaws, even the most secure registries can leak their most sensitive layers and manifests. 🎯 Time to test your container registry exploitation skills!
Launch your dedicated AWS machine to begin hacking
The solution for this lab will be available on 19 Sep 2025 00:00 UTC.
To keep the new labs challenging for everyone, solutions are only available 1 month after a lab has been released or when it gets archived, whichever comes first.Sign-in to your account to access your hacking courses and cyber security labs.
Access all hacking courses and cyber security labs.