From cb9b6adaad585486e435fda17a60ef8a1c48e43c Mon Sep 17 00:00:00 2001
From: plaint3xt <67632592+plaint3xt@users.noreply.github.com>
Date: Fri, 25 Oct 2024 14:59:50 +0200
Subject: [PATCH] Fixed formatting of code block and support summary
---
.../docker-security/seccomp.md | 36 ++++---------------
1 file changed, 7 insertions(+), 29 deletions(-)
diff --git a/linux-hardening/privilege-escalation/docker-security/seccomp.md b/linux-hardening/privilege-escalation/docker-security/seccomp.md
index 653336b7c..691fec9d6 100644
--- a/linux-hardening/privilege-escalation/docker-security/seccomp.md
+++ b/linux-hardening/privilege-escalation/docker-security/seccomp.md
@@ -14,15 +14,7 @@ Learn & practice GCP Hacking:
{% endhint %}
-{% endhint %}
-{% endhint %}
-{% endhint %}
-{% endhint %}
-{% endhint %}
-{% endhint %}
-{% endhint %}
-{% endhint %}
-{% endhint %}
+
## Basic Information
@@ -177,12 +169,16 @@ chmod: /etc/hosts: Operation not permitted
Following output shows the “docker inspect” displaying the profile:
```json
- "SecurityOpt": [
- "seccomp:{\"defaultAction\":\"SCMP_ACT_ALLOW\",\"syscalls\":[{\"name\":\"chmod\",\"action\":\"SCMP_ACT_ERRNO\"}]}"
+"SecurityOpt": [
+ "seccomp:{\"defaultAction\":\"SCMP_ACT_ALLOW\",\"syscalls\":[{\"name\":\"chmod\",\"action\":\"SCMP_ACT_ERRNO\"}]}"
+ ]
+```
+
{% hint style="success" %}
Learn & practice AWS Hacking:[**HackTricks Training AWS Red Team Expert (ARTE)**](https://training.hacktricks.xyz/courses/arte)\
Learn & practice GCP Hacking: [**HackTricks Training GCP Red Team Expert (GRTE)**](https://training.hacktricks.xyz/courses/grte)
+
Support HackTricks
@@ -193,21 +189,3 @@ Learn & practice GCP Hacking:
{% endhint %}
-
-{% endhint %}
-
-{% endhint %}
-
-{% endhint %}
-
-{% endhint %}
-
-{% endhint %}
-
-{% endhint %}
-
-{% endhint %}
-
-{% endhint %}
-
-{% endhint %}