Containerd (ctr) Privilege Escalation
Last updated
Last updated
Learn & practice AWS Hacking:HackTricks Training AWS Red Team Expert (ARTE) Learn & practice GCP Hacking: HackTricks Training GCP Red Team Expert (GRTE)
Go to the following link to learn what is containerd and ctr
:
if you find that a host contains the ctr
command:
You can list the images:
And then run one of those images mounting the host root folder to it:
Run a container privileged and escape from it. You can run a privileged container as:
Then you can use some of the techniques mentioned in the following page to escape from it abusing privileged capabilities:
Docker SecurityLearn & practice AWS Hacking:HackTricks Training AWS Red Team Expert (ARTE) Learn & practice GCP Hacking: HackTricks Training GCP Red Team Expert (GRTE)