Containerization Technologies
In this chapter I will attempt to define common methods of exploitation for containerization technologies, how they work in terms of privileges and trust and anything that might help in breaking and securing these environments. Many methods are common to all forms of container technology, but I will take time to focus on each.
LXD
Docker
Docker Socket
Source: The Dangers of Docker.sock
Further Reading
Escaping Docker containers using waitid
dirtycow-vdso
Vulnerable Docker VM
Container Security Notes
32c3 Writeup - Exploiting net=host