diff --git a/linux-hardening/privilege-escalation/docker-security/seccomp.md b/linux-hardening/privilege-escalation/docker-security/seccomp.md index 653336b7c..7593194a1 100644 --- a/linux-hardening/privilege-escalation/docker-security/seccomp.md +++ b/linux-hardening/privilege-escalation/docker-security/seccomp.md @@ -14,15 +14,6 @@ Learn & practice GCP Hacking: {% endhint %} -{% endhint %} -{% endhint %} -{% endhint %} -{% endhint %} -{% endhint %} -{% endhint %} -{% endhint %} -{% endhint %} -{% endhint %} ## Basic Information @@ -177,8 +168,11 @@ chmod: /etc/hosts: Operation not permitted Following output shows the “docker inspect” displaying the profile: ```json - "SecurityOpt": [ - "seccomp:{\"defaultAction\":\"SCMP_ACT_ALLOW\",\"syscalls\":[{\"name\":\"chmod\",\"action\":\"SCMP_ACT_ERRNO\"}]}" +"SecurityOpt": [ + "seccomp:{\"defaultAction\":\"SCMP_ACT_ALLOW\",\"syscalls\":[{\"name\":\"chmod\",\"action\":\"SCMP_ACT_ERRNO\"}]}" + ] +``` + {% hint style="success" %} Learn & practice AWS Hacking:[**HackTricks Training AWS Red Team Expert (ARTE)**](https://training.hacktricks.xyz/courses/arte)\ Learn & practice GCP Hacking: [**HackTricks Training GCP Red Team Expert (GRTE)**](https://training.hacktricks.xyz/courses/grte) @@ -193,21 +187,3 @@ Learn & practice GCP Hacking: {% endhint %} - -{% endhint %} - -{% endhint %} - -{% endhint %} - -{% endhint %} - -{% endhint %} - -{% endhint %} - -{% endhint %} - -{% endhint %} - -{% endhint %}