DO - Networking

Reading time: 2 minutes

tip

Learn & practice AWS Hacking:HackTricks Training AWS Red Team Expert (ARTE)
Learn & practice GCP Hacking: HackTricks Training GCP Red Team Expert (GRTE)

Support HackTricks

Domains

bash
doctl compute domain list
doctl compute domain records list <domain>
# You can also create records

Reserverd IPs

bash
doctl compute reserved-ip list
doctl compute reserved-ip-action unassign <ip>

Load Balancers

bash
doctl compute load-balancer list
doctl compute load-balancer remove-droplets <id> --droplet-ids 12,33
doctl compute load-balancer add-forwarding-rules <id> --forwarding-rules entry_protocol:tcp,entry_port:3306,...

VPC

doctl vpcs list

Firewall

caution

By default droplets are created WITHOUT A FIREWALL (not like in oder clouds such as AWS or GCP). So if you want DO to protect the ports of the droplet (VM), you need to create it and attach it.

bash
doctl compute firewall list
doctl compute firewall list-by-droplet <droplet-id>
doctl compute firewall remove-droplets <fw-id> --droplet-ids <droplet-id>

tip

Learn & practice AWS Hacking:HackTricks Training AWS Red Team Expert (ARTE)
Learn & practice GCP Hacking: HackTricks Training GCP Red Team Expert (GRTE)

Support HackTricks