March 22, 2023, 11:47 a.m. | Mr Jokar

System Weakness - Medium systemweakness.com

Linux Privilege Escalation with Docker !

DETECTION

We have to be the part of Docker Group of the system. Being a part of this group allows us to create new Docker Containers and deploy them.

THE PLAN

Docker is a virtualization system. It means we can create and deploy some virtual machines on top of our physical computer. These are called docker containers. The plan is to create a new docker container on our Victim Machine. As we are the …

called computer container containers cybersecurity docker escalation hacking linux machine machines physical privilege privilege escalation system victim virtual virtualization virtual machines

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Physical Security Operations Center - Supervisor

@ Equifax | USA-GA-Alpharetta-JVW3

Network Cybersecurity Engineer - Overland Park, KS Hybrid

@ Black & Veatch | Overland Park, KS, US

Cloud Security Engineer

@ Point72 | United States

Technical Program Manager, Security and Compliance, Cloud Compute

@ Google | New York City, USA; Kirkland, WA, USA

EWT Security | Vulnerability Management Analyst - AM

@ KPMG India | Gurgaon, Haryana, India