We covered the fifth part of exploiting Docker containers. We discussed one of the popular methods of escaping Docker containers, that is, exploiting misconfigured permissions, namely, Linux capabilities granted to Dockers. Using this method we can mount specific sensitive files and hashes from the host file system to a directory of our choice on the Docker container. This was part of TryHackMe The Docker Rodeo.

Get OSCP Notes

Room Answers

Does Docker run on a Hypervisor? (Yay/Nay)
What is the port number of the 2nd Docker registry?

What is the name of the repository within this registry?

What is the name of the tag that has been published?

What is the Username in the database configuration?

What is the Password in the database configuration?

What is the “IMAGE_ID” for the “challenge” Docker image that you just downloaded?

Using Dive, how many “Layers” are there in this image?

What user is successfully added?

Contents of “flag.txt” from the host operating system

Video Walkthrough

About the Author

Mastermind Study Notes is a group of talented authors and writers who are experienced and well-versed across different fields. The group is led by, Motasem Hamdan, who is a Cybersecurity content creator and YouTuber.

View Articles