all InfoSec news
Linux Privilege Escalation with Docker !
System Weakness - Medium systemweakness.com
Linux Privilege Escalation with Docker !
DETECTION
We have to be the part of Docker Group of the system. Being a part of this group allows us to create new Docker Containers and deploy them.
THE PLAN
Docker is a virtualization system. It means we can create and deploy some virtual machines on top of our physical computer. These are called docker containers. The plan is to create a new docker container on our Victim Machine. As we are the …
called computer container containers cybersecurity docker escalation hacking linux machine machines physical privilege privilege escalation system victim virtual virtualization virtual machines