diff --git a/linux-hardening/privilege-escalation/interesting-groups-linux-pe/lxd-privilege-escalation.md b/linux-hardening/privilege-escalation/interesting-groups-linux-pe/lxd-privilege-escalation.md
index 2e20d5001..f9a9ff59a 100644
--- a/linux-hardening/privilege-escalation/interesting-groups-linux-pe/lxd-privilege-escalation.md
+++ b/linux-hardening/privilege-escalation/interesting-groups-linux-pe/lxd-privilege-escalation.md
@@ -21,7 +21,7 @@ Se appartieni al gruppo _**lxd**_ **o** _**lxc**_, puoi diventare root
### Metodo 1
-Puoi installare sulla tua macchina questo distro builder: [https://github.com/lxc/distrobuilder ](https://github.com/lxc/distrobuilder)(segui le istruzioni del github):
+Puoi installare sulla tua macchina questo costruttore di distribuzioni: [https://github.com/lxc/distrobuilder ](https://github.com/lxc/distrobuilder)(segui le istruzioni del github):
```bash
sudo su
# Install requirements
@@ -63,7 +63,7 @@ lxc config device add privesc host-root disk source=/ path=/mnt/root recursive=t
```
{% hint style="danger" %}
Se trovi questo errore _**Errore: Nessun pool di archiviazione trovato. Si prega di creare un nuovo pool di archiviazione**_\
-Esegui **`lxd init`** e **ripeti** il blocco di comandi precedente
+Esegui **`lxd init`** e **ripeti** il precedente blocco di comandi
{% endhint %}
Infine puoi eseguire il contenitore e ottenere root:
@@ -93,118 +93,18 @@ lxc init myimage mycontainer -c security.privileged=true
# mount the /root into the image
lxc config device add mycontainer mydevice disk source=/ path=/mnt/root recursive=true
-
-
-
-Learn & practice AWS Hacking:
![](/.gitbook/assets/arte.png)
[**HackTricks Training AWS Red Team Expert (ARTE)**](https://training.hacktricks.xyz/courses/arte)
![](/.gitbook/assets/arte.png)
\
-Learn & practice GCP Hacking:
![](/.gitbook/assets/grte.png)
[**HackTricks Training GCP Red Team Expert (GRTE)**
![](/.gitbook/assets/grte.png)
](https://training.hacktricks.xyz/courses/grte)
+```
+{% hint style="success" %}
+Impara e pratica il hacking AWS:
![](../../../.gitbook/assets/arte.png)
[**HackTricks Training AWS Red Team Expert (ARTE)**](https://training.hacktricks.xyz/courses/arte)
![](../../../.gitbook/assets/arte.png)
\
+Impara e pratica il hacking GCP:
![](../../../.gitbook/assets/grte.png)
[**HackTricks Training GCP Red Team Expert (GRTE)**
![](../../../.gitbook/assets/grte.png)
](https://training.hacktricks.xyz/courses/grte)
-Support HackTricks
+Supporta HackTricks
-* Check the [**subscription plans**](https://github.com/sponsors/carlospolop)!
-* **Join the** 💬 [**Discord group**](https://discord.gg/hRep4RUj7f) or the [**telegram group**](https://t.me/peass) or **follow** us on **Twitter** 🐦 [**@hacktricks\_live**](https://twitter.com/hacktricks\_live)**.**
-* **Share hacking tricks by submitting PRs to the** [**HackTricks**](https://github.com/carlospolop/hacktricks) and [**HackTricks Cloud**](https://github.com/carlospolop/hacktricks-cloud) github repos.
+* Controlla i [**piani di abbonamento**](https://github.com/sponsors/carlospolop)!
+* **Unisciti al** 💬 [**gruppo Discord**](https://discord.gg/hRep4RUj7f) o al [**gruppo telegram**](https://t.me/peass) o **seguici** su **Twitter** 🐦 [**@hacktricks\_live**](https://twitter.com/hacktricks\_live)**.**
+* **Condividi trucchi di hacking inviando PR ai** [**HackTricks**](https://github.com/carlospolop/hacktricks) e [**HackTricks Cloud**](https://github.com/carlospolop/hacktricks-cloud) repos su github.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-hacking tricks by submitting PRs to the** [**HackTricks**](https://github.com/carlospolop/hacktricks) and [**HackTricks Cloud**](https://github.com/carlospolop/hacktricks-cloud) github repos.
-
-
-
-
-
-
-```
-
+{% endhint %}