Escape to Host
Adversaries may break out of a container or virtualized environment to gain access to the underlying host. This can allow an adversary access to other containerized or virtualized resources from the host level or to the host itself. In principle, containerized / virtualized resources should provide a clear separation of application functionality and be isolated from the host environment.(Citation: Docker Overview) There are multiple ways an adversary may escape from a container to a host enviro...
BY SOURCE
PROCEDURES (16)
Auto-extracted: 6 detections for privilege
Auto-extracted: 5 detections for privilege
Auto-extracted: 3 detections for general monitoring
Auto-extracted: 2 detections for lateral
Auto-extracted: 1 detections for process creation monitoring
Auto-extracted: 1 detections for bypass
Auto-extracted: 1 detections for privilege
Auto-extracted: 1 detections for lateral
Auto-extracted: 1 detections for suspicious
Auto-extracted: 1 detections for suspicious
Auto-extracted: 1 detections for privilege
Auto-extracted: 1 detections for lateral
Auto-extracted: 1 detections for api
Auto-extracted: 1 detections for api
Auto-extracted: 1 detections for persist
Auto-extracted: 1 detections for bypass