πŸ‹Docker Container Escape

🎯 Overview

Docker group membership provides equivalent root access to host filesystem through container mounting and privileged container execution.

πŸ” Prerequisites

Check Docker Group Membership

# Check if user is in docker group
id | grep docker
groups | grep docker

# Example output:
# uid=1000(user) gid=1000(user) groups=1000(user),999(docker)

Docker Service Status

# Check if Docker is running
systemctl status docker
docker --version
docker ps

πŸš€ Exploitation Methods

Method 1: Mount Host Filesystem

Method 2: Privileged Container

Method 3: Direct Host Shell

πŸ”§ Docker Image Management

Available Images

Pull and Use Images

🎯 Post-Exploitation

Host System Access

Escape Verification

πŸ” Detection & Enumeration

Quick Docker Check Script

Docker Socket Check

πŸ”‘ Quick Reference

Immediate Checks

Emergency Escalation

One-liner Escalation

πŸ”§ Advanced Techniques

Container Breakout

Persistence Methods

⚠️ Defensive Considerations

Docker Security Issues

  • Group membership = root equivalent access

  • Host filesystem mounting bypasses all isolation

  • Privileged containers disable security features

  • No authentication required for group members

Hardening Recommendations


Docker group membership eliminates container isolation - privileged containers with host mounts provide immediate root access to the underlying host system.

Last updated