From b435c0962ce9df91204818cd6a7a7cf5a30c5ff8 Mon Sep 17 00:00:00 2001 From: plaint3xt <67632592+plaint3xt@users.noreply.github.com> Date: Fri, 25 Oct 2024 15:23:14 +0200 Subject: [PATCH] removed newlines --- linux-hardening/privilege-escalation/docker-security/seccomp.md | 2 -- 1 file changed, 2 deletions(-) diff --git a/linux-hardening/privilege-escalation/docker-security/seccomp.md b/linux-hardening/privilege-escalation/docker-security/seccomp.md index 691fec9d6..7593194a1 100644 --- a/linux-hardening/privilege-escalation/docker-security/seccomp.md +++ b/linux-hardening/privilege-escalation/docker-security/seccomp.md @@ -15,7 +15,6 @@ Learn & practice GCP Hacking: {% endhint %} - ## Basic Information **Seccomp**, standing for Secure Computing mode, is a security feature of the **Linux kernel designed to filter system calls**. It restricts processes to a limited set of system calls (`exit()`, `sigreturn()`, `read()`, and `write()` for already-open file descriptors). If a process tries to call anything else, it gets terminated by the kernel using SIGKILL or SIGSYS. This mechanism doesn't virtualize resources but isolates the process from them. @@ -178,7 +177,6 @@ Following output shows the “docker inspect” displaying the profile: Learn & practice AWS Hacking:[**HackTricks Training AWS Red Team Expert (ARTE)**](https://training.hacktricks.xyz/courses/arte)\ Learn & practice GCP Hacking: [**HackTricks Training GCP Red Team Expert (GRTE)**](https://training.hacktricks.xyz/courses/grte) -
Support HackTricks