Abusing Privileged and Unprivileged Linux Containers

In this paper, we’ll discuss several security pitfalls with Linux containers. Many of them are intrinsic to the design of the container systems, or may be the result of insecure defaults. We’ll analyse historical container attacks, and how they are currently mitigated. We will then examine several novel or poorly documented attacks possible against both privileged and unprivileged Linux containers. This paper is geared towards penetration testers, but also provides insight for administrators and developers looking to prevent common attacks against their container systems.

Download Whitepaper

Author: Jesse Hertz

Call us before you need us.

Our experts will help you.

Get in touch