Container Vulnerabilities -- [TryHackMe LIVE!]
Join the Hack Smarter community: https://hacksmarter.org
--- In this video, I work through the full "Container Vulnerabilities" room on TryHackMe. We get hands-on experience with the following learning objectives:
- Some of the vulnerabilities that can exist in a Docker container.
- What we, as an attacker, can gain from exploiting these vulnerabilities.
- Why these vulnerabilities exist (i.e. misconfiguration).
- How to search for vulnerabilities within a Docker container.
We then escape the docker container into the Host system in four ways:
1. Privilege Containers
2. Via Exposed Docker Daemon
3. RCE via Exposed Docker Daemon
4. Abusing Namespaces
Enjoy! ----------
This content is intended for educational purposes only. All demonstrations and techniques shown are designed to teach ethical hacking and improve cybersecurity. Any use of the information provided in these videos is done at your own risk and should be used responsibly. Unauthorized hacking, illegal activities, or violations of privacy are not endorsed or encouraged. Always ensure you have proper authorization before attempting any security testing or hacking.