Proof of Concept: Manually Escaping Privileged Docker Containers Without Exploiting Vulnerabilities



This proof of concept shows how to escape privileged Docker containers without needing to exploit any vulnerabilities. This can allow malicious actors to gain a backdoor in a system. Read more about this on our Twitter thread: https://twitter.com/TrendMicroRSRCH/status/1407333806500192260

Trend Micro, a global cybersecurity leader, helps make the world safe for exchanging digital information. Fueled by decades of security expertise, global threat research, and continuous innovation, our cybersecurity platform protects hundreds of thousands of organizations and millions of individuals across clouds, networks, devices, and endpoints.
To find out more about our products and services visit us at https://www.trendmicro.com/

You can also find us on Social Media:
Facebook: https://www.facebook.com/TrendMicro/
Twitter: https://twitter.com/trendmicro
LinkedIn: https://www.linkedin.com/company/trend-micro/

source