mirror of
https://github.com/carlospolop/hacktricks
synced 2024-11-24 21:53:54 +00:00
Fixed formatting of code block and support summary
This commit is contained in:
parent
56354f7db7
commit
cb9b6adaad
1 changed files with 7 additions and 29 deletions
|
@ -14,15 +14,7 @@ Learn & practice GCP Hacking: <img src="/.gitbook/assets/grte.png" alt="" data-s
|
||||||
|
|
||||||
</details>
|
</details>
|
||||||
{% endhint %}
|
{% endhint %}
|
||||||
{% endhint %}
|
|
||||||
{% endhint %}
|
|
||||||
{% endhint %}
|
|
||||||
{% endhint %}
|
|
||||||
{% endhint %}
|
|
||||||
{% endhint %}
|
|
||||||
{% endhint %}
|
|
||||||
{% endhint %}
|
|
||||||
{% endhint %}
|
|
||||||
|
|
||||||
## Basic Information
|
## Basic Information
|
||||||
|
|
||||||
|
@ -177,12 +169,16 @@ chmod: /etc/hosts: Operation not permitted
|
||||||
Following output shows the “docker inspect” displaying the profile:
|
Following output shows the “docker inspect” displaying the profile:
|
||||||
|
|
||||||
```json
|
```json
|
||||||
"SecurityOpt": [
|
"SecurityOpt": [
|
||||||
"seccomp:{\"defaultAction\":\"SCMP_ACT_ALLOW\",\"syscalls\":[{\"name\":\"chmod\",\"action\":\"SCMP_ACT_ERRNO\"}]}"
|
"seccomp:{\"defaultAction\":\"SCMP_ACT_ALLOW\",\"syscalls\":[{\"name\":\"chmod\",\"action\":\"SCMP_ACT_ERRNO\"}]}"
|
||||||
|
]
|
||||||
|
```
|
||||||
|
|
||||||
{% hint style="success" %}
|
{% hint style="success" %}
|
||||||
Learn & practice AWS Hacking:<img src="/.gitbook/assets/arte.png" alt="" data-size="line">[**HackTricks Training AWS Red Team Expert (ARTE)**](https://training.hacktricks.xyz/courses/arte)<img src="/.gitbook/assets/arte.png" alt="" data-size="line">\
|
Learn & practice AWS Hacking:<img src="/.gitbook/assets/arte.png" alt="" data-size="line">[**HackTricks Training AWS Red Team Expert (ARTE)**](https://training.hacktricks.xyz/courses/arte)<img src="/.gitbook/assets/arte.png" alt="" data-size="line">\
|
||||||
Learn & practice GCP Hacking: <img src="/.gitbook/assets/grte.png" alt="" data-size="line">[**HackTricks Training GCP Red Team Expert (GRTE)**<img src="/.gitbook/assets/grte.png" alt="" data-size="line">](https://training.hacktricks.xyz/courses/grte)
|
Learn & practice GCP Hacking: <img src="/.gitbook/assets/grte.png" alt="" data-size="line">[**HackTricks Training GCP Red Team Expert (GRTE)**<img src="/.gitbook/assets/grte.png" alt="" data-size="line">](https://training.hacktricks.xyz/courses/grte)
|
||||||
|
|
||||||
|
|
||||||
<details>
|
<details>
|
||||||
|
|
||||||
<summary>Support HackTricks</summary>
|
<summary>Support HackTricks</summary>
|
||||||
|
@ -193,21 +189,3 @@ Learn & practice GCP Hacking: <img src="/.gitbook/assets/grte.png" alt="" data-s
|
||||||
|
|
||||||
</details>
|
</details>
|
||||||
{% endhint %}
|
{% endhint %}
|
||||||
</details>
|
|
||||||
{% endhint %}
|
|
||||||
</details>
|
|
||||||
{% endhint %}
|
|
||||||
</details>
|
|
||||||
{% endhint %}
|
|
||||||
</details>
|
|
||||||
{% endhint %}
|
|
||||||
</details>
|
|
||||||
{% endhint %}
|
|
||||||
</details>
|
|
||||||
{% endhint %}
|
|
||||||
</details>
|
|
||||||
{% endhint %}
|
|
||||||
</details>
|
|
||||||
{% endhint %}
|
|
||||||
</details>
|
|
||||||
{% endhint %}
|
|
||||||
|
|
Loading…
Reference in a new issue