Abusing Privileged and Unprivileged Linux Containers

In this paper, we'll discuss several security pitfalls with Linux containers. Many of them are intrinsic to the design of the container systems, or may be the result of insecure defaults. We'll analyze historical container attacks, and how they are currently mitigated. We will then examine several novel or poorly documented attacks possible against both privileged and unprivileged Linux containers. This paper is geared towards penetration testers, but also provides insight for administrators and developers looking to prevent common attacks against their container systems.

Download Whitepaper

Author: Jesse Hertz

Published date:  01 June 2016

Filter By Service

Filter By Type