Deepdive Containers - Kernel Sources and nsenter

Channel:
Subscribers:
920,000
Published on ● Video Link: https://www.youtube.com/watch?v=sHp0Q3rvamk



Duration: 11:46
41,035 views
1,557


Let's play around with Docker a bit more. We learn about the nsenter command, how kernel code execution allows escaping from docker and we look at Linux Kernel source code of getpid().

Daniel Mitre's blog: https://medium.com/@flag_seeker/linux-container-from-scratch-339c3ba0411d
bocker: https://github.com/p8952/bocker/
Elixir: https://elixir.bootlin.com/linux/latest/source/kernel/sys.c#L891
Denis Andzakovic: https://pulsesecurity.co.nz/articles/docker-rootkits

-=[ ❀ Support ]=-

→ per Video: https://www.patreon.com/join/liveoverflow
→ per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join

-=[ 🐕 Social ]=-

→ Twitter: https://twitter.com/LiveOverflow/
→ Website: https://liveoverflow.com/
→ Subreddit: https://www.reddit.com/r/LiveOverflow/
→ Facebook: https://www.facebook.com/LiveOverflow/

-=[ 📄 P.S. ]=-

All links with "*" are affiliate links.
LiveOverflow / Security Flag GmbH is part of the Amazon Affiliate Partner Programm.







Tags:
Live Overflow
liveoverflow
hacking tutorial
how to hack
exploit tutorial
docker
nsenter
docker exec
kernel sources
linux kernel
namespaces
namespace
pid
utc
mount
overlayfs
syscall
getpid
containers
container