How to Exploit Docker Containers with a Volume Mount Attack | Container Security | Part 9

preview_player
Показать описание
Here's the next episode in our AppSecEngineer Hands-On Labs Walkthrough Series!

In this series, we’ll start by diving deep into Docker – understanding what it is and why it’s become an essential tool in modern software development.

In this video, we dive into one of the most critical Docker container attacks: the Volume Mount attack. Learn how to execute a container breakout by mounting the host filesystem to a Docker container, even as a non-root user. We'll walk through the entire process, from validating user access to exploiting the host machine's root directory.

Don't forget to hit the subscribe button and click the bell icon so you don't miss any of our upcoming episodes.

#docker #container #containersecurity #cybersecurity #appsec #infosec #infosectraining #developer #securityengineer #applicationsecurit
Рекомендации по теме