From cb9b6adaad585486e435fda17a60ef8a1c48e43c Mon Sep 17 00:00:00 2001 From: plaint3xt <67632592+plaint3xt@users.noreply.github.com> Date: Fri, 25 Oct 2024 14:59:50 +0200 Subject: [PATCH] Fixed formatting of code block and support summary --- .../docker-security/seccomp.md | 36 ++++--------------- 1 file changed, 7 insertions(+), 29 deletions(-) diff --git a/linux-hardening/privilege-escalation/docker-security/seccomp.md b/linux-hardening/privilege-escalation/docker-security/seccomp.md index 653336b7c..691fec9d6 100644 --- a/linux-hardening/privilege-escalation/docker-security/seccomp.md +++ b/linux-hardening/privilege-escalation/docker-security/seccomp.md @@ -14,15 +14,7 @@ Learn & practice GCP Hacking: {% endhint %} -{% endhint %} -{% endhint %} -{% endhint %} -{% endhint %} -{% endhint %} -{% endhint %} -{% endhint %} -{% endhint %} -{% endhint %} + ## Basic Information @@ -177,12 +169,16 @@ chmod: /etc/hosts: Operation not permitted Following output shows the “docker inspect” displaying the profile: ```json - "SecurityOpt": [ - "seccomp:{\"defaultAction\":\"SCMP_ACT_ALLOW\",\"syscalls\":[{\"name\":\"chmod\",\"action\":\"SCMP_ACT_ERRNO\"}]}" +"SecurityOpt": [ + "seccomp:{\"defaultAction\":\"SCMP_ACT_ALLOW\",\"syscalls\":[{\"name\":\"chmod\",\"action\":\"SCMP_ACT_ERRNO\"}]}" + ] +``` + {% hint style="success" %} Learn & practice AWS Hacking:[**HackTricks Training AWS Red Team Expert (ARTE)**](https://training.hacktricks.xyz/courses/arte)\ Learn & practice GCP Hacking: [**HackTricks Training GCP Red Team Expert (GRTE)**](https://training.hacktricks.xyz/courses/grte) +
Support HackTricks @@ -193,21 +189,3 @@ Learn & practice GCP Hacking: {% endhint %} -
-{% endhint %} - -{% endhint %} - -{% endhint %} - -{% endhint %} - -{% endhint %} - -{% endhint %} - -{% endhint %} - -{% endhint %} - -{% endhint %}