diff --git a/linux-hardening/privilege-escalation/docker-security/seccomp.md b/linux-hardening/privilege-escalation/docker-security/seccomp.md index 653336b7c..691fec9d6 100644 --- a/linux-hardening/privilege-escalation/docker-security/seccomp.md +++ b/linux-hardening/privilege-escalation/docker-security/seccomp.md @@ -14,15 +14,7 @@ Learn & practice GCP Hacking: {% endhint %} -{% endhint %} -{% endhint %} -{% endhint %} -{% endhint %} -{% endhint %} -{% endhint %} -{% endhint %} -{% endhint %} -{% endhint %} + ## Basic Information @@ -177,12 +169,16 @@ chmod: /etc/hosts: Operation not permitted Following output shows the “docker inspect” displaying the profile: ```json - "SecurityOpt": [ - "seccomp:{\"defaultAction\":\"SCMP_ACT_ALLOW\",\"syscalls\":[{\"name\":\"chmod\",\"action\":\"SCMP_ACT_ERRNO\"}]}" +"SecurityOpt": [ + "seccomp:{\"defaultAction\":\"SCMP_ACT_ALLOW\",\"syscalls\":[{\"name\":\"chmod\",\"action\":\"SCMP_ACT_ERRNO\"}]}" + ] +``` + {% hint style="success" %} Learn & practice AWS Hacking:[**HackTricks Training AWS Red Team Expert (ARTE)**](https://training.hacktricks.xyz/courses/arte)\ Learn & practice GCP Hacking: [**HackTricks Training GCP Red Team Expert (GRTE)**](https://training.hacktricks.xyz/courses/grte) +
Support HackTricks @@ -193,21 +189,3 @@ Learn & practice GCP Hacking: {% endhint %} -
-{% endhint %} - -{% endhint %} - -{% endhint %} - -{% endhint %} - -{% endhint %} - -{% endhint %} - -{% endhint %} - -{% endhint %} - -{% endhint %}