Skip to content

Commit

Permalink
remove hacktricks references (#165)
Browse files Browse the repository at this point in the history
Co-authored-by: Jeremy Fox <[email protected]>
  • Loading branch information
christophetd and d0g0x01 authored Feb 21, 2024
1 parent e4117bc commit 569e3f4
Show file tree
Hide file tree
Showing 3 changed files with 5 additions and 4 deletions.
2 changes: 1 addition & 1 deletion docs/reference/attacks/CE_NSENTER.md
Original file line number Diff line number Diff line change
Expand Up @@ -84,6 +84,6 @@ Avoid running containers as the `root` user. Enforce running as an unprivileged
## References:

+ [nsenter(1) - Linux manual page](https://man7.org/linux/man-pages/man1/nsenter.1.html)
+ [Docker Breakout / Privilege Escalation](https://book.hacktricks.xyz/linux-hardening/privilege-escalation/docker-breakout/docker-breakout-privilege-escalation#privileged-+-hostpid)
+ [Bad Pod #2: Privilege and HostPid](https://bishopfox.com/blog/kubernetes-pod-privilege-escalation#Pod2)
+ [Debugging containers using nsenter](https://jaanhio.me/blog/nsenter-debug/)

4 changes: 2 additions & 2 deletions docs/reference/attacks/CE_PRIV_MOUNT.md
Original file line number Diff line number Diff line change
Expand Up @@ -82,5 +82,5 @@ Avoid running containers as the `root` user. Enforce running as an unprivileged

## References:

+ [HackTricks Docker Breakout](https://book.hacktricks.xyz/linux-hardening/privilege-escalation/docker-security/docker-breakout-privilege-escalation)

+ [Bad Pods: Kubernetes Pod Privilege Escalation](https://bishopfox.com/blog/kubernetes-pod-privilege-escalation)
+ [7 Ways to Escape a Container](https://www.panoptica.app/research/7-ways-to-escape-a-container)
3 changes: 2 additions & 1 deletion docs/reference/attacks/EXPLOIT_HOST_WRITE.md
Original file line number Diff line number Diff line change
Expand Up @@ -70,6 +70,7 @@ Avoid running containers as the `root` user. Enforce running as an unprivileged

## References:

+ [HackTricks Docker Breakout](https://book.hacktricks.xyz/linux-hardening/privilege-escalation/docker-security/docker-breakout-privilege-escalation)
+ [Bad Pods: Kubernetes Pod Privilege Escalation](https://bishopfox.com/blog/kubernetes-pod-privilege-escalation)
+ [7 Ways to Escape a Container](https://www.panoptica.app/research/7-ways-to-escape-a-container)
+ [Atomic Red Team T1611](https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1611/T1611.md)

0 comments on commit 569e3f4

Please sign in to comment.