Build a vulnerable docker image, run it in privileged move, attack it and escalate rights.

Maybe alternatively or additionally we could walk through some high profile attacks.