Docker Privilege Escalation & Host Compromise
During an internal penetration test, you gain shell access to a Docker container running as part of the organization's microservices architecture. Container Environment: - Container ID: c8f3d91e4a2b - Base Image: ubuntu:20.04 - Running User: root (inside container) - Host OS: Ubuntu 22.04 LTS - Docker Version: 24.0.7 Initial Enumeration Results: - Container is running in privileged mode - Host filesystem potentially accessible via /host mount - Docker socket mounted at /var/run/docker.sock - CAP_SYS_ADMIN capability detected Your Goal: Escape the container to gain access to the underlying host system.