A Compendium of Container Escapes

Subscribers:
5,970
Published on ● Video Link: https://www.youtube.com/watch?v=9pMXUImdb1E



Duration: 43:10
23 views
1


Brandon Edwards | Chief Scientist, Capsule8
Nick Freeman | Research Scientist, Capsule8
Location: South Seas ABE
Date: Thursday, August 8 | 3:50pm-4:40pm
Format: 50-Minute Briefings
Tracks: Platform Security, Exploit Development

Containers are a hot topic because of the simplicity they bring to the process of software development, shipping, and deployment. They are insanely useful for eliminating environmental constraints such as library version conflicts, and for the overall organization and hygiene of software. Containers also provide some security properties, including version management, an expression of intent, and often reduced attack surface. However, it is important to understand that although the organizational isolation of containers is what enables these security properties, isolation itself is not a security property of containers.

As such, it becomes important to understand the security properties of containers, how they have been escaped in the past, and how they are likely to be escaped in the future. This year kicked off with a container escape vulnerability in runc, used by various container engines, which seemed to come as a shock for many users of containers.

The goal of this talk is to broaden the awareness of the how and why container escapes work, starting from a brief intro to what makes a process a container, and then spanning the gamut of escape techniques, covering exposed orchestrators, access to the Docker socket, exposed mount points, /proc, all the way down to overwriting/exploiting the kernel structures to leave the confines of the container.

Black Hat - USA - 2019 Hacking conference
#hacking, #hackers, #infosec, #opsec, #IT, #security







Tags:
data
hacker
security
computer
cyber
internet
technology
hacking
attack
digital
virus
information
hack
online
crime
password
code
web
concept
protection
network
malware
identity
criminal
software
access
system
firewall
communication
business
privacy
spy
programmer
program
spyware
hacked
hacking conference
learn
how to
2022
cybersecurity
owned
securing
exploit
exploitation
recon
social engineering
Brandon Edwards
Nick Freeman
container escapes
docker
docker socket
mount points