Build a vulnerable docker image, run it in privileged move, attack it and escalate rights.
Maybe alternatively or additionally we could walk through some high profile attacks.
You must log in or register to comment.
Build a vulnerable docker image, run it in privileged move, attack it and escalate rights.
Maybe alternatively or additionally we could walk through some high profile attacks.