From b435c0962ce9df91204818cd6a7a7cf5a30c5ff8 Mon Sep 17 00:00:00 2001
From: plaint3xt <67632592+plaint3xt@users.noreply.github.com>
Date: Fri, 25 Oct 2024 15:23:14 +0200
Subject: [PATCH] removed newlines
---
linux-hardening/privilege-escalation/docker-security/seccomp.md | 2 --
1 file changed, 2 deletions(-)
diff --git a/linux-hardening/privilege-escalation/docker-security/seccomp.md b/linux-hardening/privilege-escalation/docker-security/seccomp.md
index 691fec9d6..7593194a1 100644
--- a/linux-hardening/privilege-escalation/docker-security/seccomp.md
+++ b/linux-hardening/privilege-escalation/docker-security/seccomp.md
@@ -15,7 +15,6 @@ Learn & practice GCP Hacking:
{% endhint %}
-
## Basic Information
**Seccomp**, standing for Secure Computing mode, is a security feature of the **Linux kernel designed to filter system calls**. It restricts processes to a limited set of system calls (`exit()`, `sigreturn()`, `read()`, and `write()` for already-open file descriptors). If a process tries to call anything else, it gets terminated by the kernel using SIGKILL or SIGSYS. This mechanism doesn't virtualize resources but isolates the process from them.
@@ -178,7 +177,6 @@ Following output shows the “docker inspect” displaying the profile:
Learn & practice AWS Hacking:[**HackTricks Training AWS Red Team Expert (ARTE)**](https://training.hacktricks.xyz/courses/arte)\
Learn & practice GCP Hacking: [**HackTricks Training GCP Red Team Expert (GRTE)**](https://training.hacktricks.xyz/courses/grte)
-
Support HackTricks