What is Docker Escape Method?


Firstly, we are required to understand the importance of Docker escape or also containers escape which was infrastructure that is used by virtual or day-to-day operations for all enterprises. The case of cybersecurity incidents is been risen nowadays, especially the docker escape which we will be able to learn on this post.


However, the docker escape attack is surely different from the endpoint security surface where the attack might take action inside the container.

The Breaking out Method Details


So, normally breaking out from the docker or container was called a “container escape” which allows the bad guys to break out from the docker to the underlying host of the machine. As a result, the bad guys will able to do some escalation on the machine where they can move to the other docker or containers from the host.

Demonstration on the breaking out method


The demonstration will be able to access by the public over here where there are a lot of dockers that have been using by exploited the talkative machine. The script that I used on the machine is able to download over here

Use Pwncat to upload the file on the docker environment


On this method, we can use the pwncat for uploading the script on the docker environment

Graphical user interface, text

Description automatically generated with medium confidence

However, I change using pwncat which it’s easier to upload files to the victim’s machine

Text

Description automatically generated

We need to transfer the shocker.c into saul environment

Text

Description automatically generated with medium confidence

When we have finally transferred the file to the saul environment, we need to compile the shocker code


We can upload the file to the victim’s machine

A screenshot of a computer

Description automatically generated with low confidence

We should be given permission that will be executed to the shocker binary

Graphical user interface, text

Description automatically generated