Container escape techniques
Container Escape Techniques
What Makes Container Escape Dangerous
Container Environment Discovery and Enumeration
Identifying Container Environment
# Check if running in container
ls -la /.dockerenv
cat /proc/1/cgroup | grep docker
cat /proc/self/cgroup | grep docker
# Check for container runtime
ps aux | grep -E "(docker|containerd|runc)"
ls -la /var/run/docker.sock
# Check container metadata
env | grep -i container
cat /proc/version
uname -aHigh-Value Container Escape Techniques
Docker Socket Escape
Privileged Container Escape
Capability-Based Escape
Volume Mount Escape
Kubernetes Pod Escape
Service Account Token Abuse
Pod Security Context Abuse
Real-World Container Escape Examples
Example 1: Docker Socket Mount
Example 2: Privileged Container with CAP_SYS_ADMIN
Key Operational Considerations
Success Indicators
Common Failure Points
Exploitation Notes
Last updated
Was this helpful?