Docker Breakout – Linux Privilege Escalation
For this post, we will explore escalating privileges on a target Linux host by using Docker breakout techniques. We will review three different docker breakout scenarios. In each scenario, we will see a different technique that can be leveraged to…