Offensive Container Security: Techniques, Misconfigurations, and Attack Paths
Introduction:
In this post, I present a series of offensive techniques and real-world misconfigurations encountered while exploring containerized environments, particularly Docker and Kubernetes. From container escapes via mounted sockets to privileg...
offensivebytes.com15 min read