Containerd (ctr) Privilege Escalation
Last updated
Last updated
Go to the following link to learn what is containerd and ctr
:
if you find that a host contains the ctr
command:
You can list the images:
And then run one of those images mounting the host root folder to it:
Run a container privileged and escape from it. You can run a privileged container as:
Then you can use some of the techniques mentioned in the following page to escape from it abusing privileged capabilities: