To access material, start machines and answer questions login.
This room will demonstrate some of the common vulnerabilities found in Docker containers and how an attacker can abuse these to escape.
Learning Objectives
In this room, you will learn the following:
- Some of the vulnerabilities that can exist in a Docker .
- What you, as an attacker, can gain from exploiting these vulnerabilities.
- Why these vulnerabilities exist (i.e. misconfiguration).
- How to search for vulnerabilities within a Docker .
Prerequisites
Before proceeding, it is strongly recommended that you have completed the Intro to Docker room and are comfortable with the .
Important Context
This room focuses on exploiting the Docker daemon itself, which often, relies on having elevated permissions within the . In other words, this room assumes that you have already managed to become root in the .
Deploy the Vulnerable Machine for This Room
Press the green "Start Machine" button located at the top-right of this task. You can access the machine using the credentials below, via the TryHackMe AttackBox or by connecting your machine to the TryHackMe Network. You will be using this machine to answer the questions throughout the tasks in this room.
| Username | root |
| Password | tryhackme123! |
| IP | MACHINE_IP |
Ready to learn Cyber Security?
The Container Vulnerabilities room is only available for premium users. Signup now to access more than 500 free rooms and learn cyber security through a fun, interactive learning environment.
Already have an account? Log in
