Get a detailed walkthrough on the Linux privileged escalation CTF brought to you by the attackdefence platform.
This is part 2 of container host breakout where you will learn how to interact with low-level APIs and other OCI tools like containerd to escalate to the root user.
Understand how the docker demon running on the remote system or managed service like portainer could be a security risk that should be avoided to prevent the entire infrastructure take over
How about injecting the kernel modules and overwriting the files of the host from the "isolated" containers? Learn how to abuse extra capabilities provided to the container and break out of the isolation.
Learn the advanced techniques like inter-process communication, abusing Linux capabilities and process injection to break out of an isolated docker container