diff --git a/linux-hardening/privilege-escalation/docker-security/seccomp.md b/linux-hardening/privilege-escalation/docker-security/seccomp.md
index 653336b7c..7593194a1 100644
--- a/linux-hardening/privilege-escalation/docker-security/seccomp.md
+++ b/linux-hardening/privilege-escalation/docker-security/seccomp.md
@@ -14,15 +14,6 @@ Learn & practice GCP Hacking:
{% endhint %}
-{% endhint %}
-{% endhint %}
-{% endhint %}
-{% endhint %}
-{% endhint %}
-{% endhint %}
-{% endhint %}
-{% endhint %}
-{% endhint %}
## Basic Information
@@ -177,8 +168,11 @@ chmod: /etc/hosts: Operation not permitted
Following output shows the “docker inspect” displaying the profile:
```json
- "SecurityOpt": [
- "seccomp:{\"defaultAction\":\"SCMP_ACT_ALLOW\",\"syscalls\":[{\"name\":\"chmod\",\"action\":\"SCMP_ACT_ERRNO\"}]}"
+"SecurityOpt": [
+ "seccomp:{\"defaultAction\":\"SCMP_ACT_ALLOW\",\"syscalls\":[{\"name\":\"chmod\",\"action\":\"SCMP_ACT_ERRNO\"}]}"
+ ]
+```
+
{% hint style="success" %}
Learn & practice AWS Hacking:[**HackTricks Training AWS Red Team Expert (ARTE)**](https://training.hacktricks.xyz/courses/arte)\
Learn & practice GCP Hacking: [**HackTricks Training GCP Red Team Expert (GRTE)**](https://training.hacktricks.xyz/courses/grte)
@@ -193,21 +187,3 @@ Learn & practice GCP Hacking:
{% endhint %}
-
-{% endhint %}
-
-{% endhint %}
-
-{% endhint %}
-
-{% endhint %}
-
-{% endhint %}
-
-{% endhint %}
-
-{% endhint %}
-
-{% endhint %}
-
-{% endhint %}