Docker escape
Investigation
https://exploit-notes.hdks.org/exploit/container/docker/docker-escape/#investigation
If we are in the docker container, we first need to investigate basic information about the container.
Run a new vulnerable docker machine.
https://book.hacktricks.xyz/network-services-pentesting/2375-pentesting-docker#compromising
Abusing this it's possible to escape form a container, you could run a weak container in the remote machine, escape from it, and compromise the machine:
Run existing docker image
Last updated