Docker breakout

Docker breakout is the operation of bypassing the isolation layer of Docker containers, pivoting to the host and getting access to information in an authorized way and the process of trying to gain more privilege (privilege escalation). Docker breakout could be done, thanks to some different attack vectors. The first vector is the threats discussed before: kernel vulnerabilities. Abusing privilege is another Docker breakout technique. Attackers can use inter-container communication (icc) which allows containers to communicate with each other. To secure Docker, you need to set the -icc flag to false, in addition to configuring iptables:

docker -d --icc=false --iptables

Docker plays a middleware role between kernel and container. ...

Get Advanced Infrastructure Penetration Testing now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.