Skip to main contentSkip to main content
Room Banner
Back to all walkthroughs
Room Icon

Container Vulnerabilities

Premium room

Learn how some of the common vulnerabilities found within Docker containers can be exploited.

easy

60 min

10,727

User profile photo.
User profile photo.

To access material, start machines and answer questions login.

This room will demonstrate some of the common vulnerabilities found in Docker containers and how an attacker can abuse these to escape.

Learning Objectives

In this room, you will learn the following:

  • Some of the vulnerabilities that can exist in a Docker .
  • What you, as an attacker, can gain from exploiting these vulnerabilities.
  • Why these vulnerabilities exist (i.e. misconfiguration).
  • How to search for vulnerabilities within a Docker .

Prerequisites

Before proceeding, it is strongly recommended that you have completed the Intro to Docker room and are comfortable with the  .

Important Context

This room focuses on exploiting the Docker daemon itself, which often, relies on having elevated permissions within the . In other words, this room assumes that you have already managed to become root in the .

Deploy the Vulnerable Machine for This Room

Press the green "Start Machine" button located at the top-right of this task. You can access the machine using the credentials below, via the TryHackMe AttackBox or by connecting your machine to the TryHackMe Network. You will be using this machine to answer the questions throughout the tasks in this room.

THM Key Credentials
Username root
Password tryhackme123!
IP MACHINE_IP
Answer the questions below
Complete me to progress with this room!

Ready to learn Cyber Security?

The Container Vulnerabilities room is only available for premium users. Signup now to access more than 500 free rooms and learn cyber security through a fun, interactive learning environment.

Already have an account? Log in

We use cookies to ensure you get the best user experience. For more information see our cookie policy.