docker Breakout from the Seccomp Unconfined Container In this post, you'll discover how to exploit the CAP SYS MODULE capability in a privileged exec session to break out of a seccomp unconfined container that was launched with no extra rights or capabilities.
linux Exploiting Linux Capabilities – Part 5 Learn the basics of networking and how to perform privileged tasks when you have special network capabilities: cap_net_raw, cap_net_bind_service and cap_net_admin
linux Exploiting Linux Capabilities – Part 4 Learn about Linux file capabilities like cap_fowner, cap_setfcap, cap_dac_override and cap_linux_immutable and how to exploit these in order to read privileged files or get the root user shell
linux Exploiting Linux Capabilities – Part 3 In this post you will learn how to exploit the capabilities often provided to a sysadmin for example cap_sys_admin, cap_sys_time, cap_kill and cap_chown
linux Exploiting Linux Capabilities – Part 2 Learn about dac_read_search and dac_override capabilities and how to exploit them in different programs to get the root user access in linux
linux Exploiting Linux Capabilities – Part 1 Get the practical knowledge on how to abuse cap_setuid and cap_setgid capabilities in Linux to get the root user shell
linux Understanding Linux Capabilities Get a basic understanding of what Linux capabilities are and how to use the utility tools like capsh, setcap and getcap to manage or print capabilities of program files and running processes or tasks