Back to directory
WRITEUP #1617

Breaking Docker Named Pipes SYSTEMatically: Docker Desktop Privilege Escalation – Part 1

Privilege EscalationLocal Privilege EscalationWindowsThick client
byEviatar Gerzi
Program
Docker
Published
Feb 2, 2023
Added to HackDex
Feb 16, 2023
Read Full Writeuphttps://www.cyberark.com/resources/threat-research-blog/breaking-docker-named-pipes-systematically-docker-desktop-privilege-escalation-part-1
RELATED WRITEUPS
I hacked a card printer software (CVE-2024-34329)
Privilege EscalationLocal Privilege Escalation
Microsoft Windows MSI Installer - Repair to SYSTEM - A detailed journey
Privilege EscalationLocal Privilege Escalation
3CX Phone System Local Privilege Escalation Vulnerability
Privilege EscalationLocal Privilege Escalation
Windows Installer, Exploiting Custom Actions
Privilege EscalationLocal Privilege Escalation
Identity Crisis: The Curious Case of a Delinea Local Privilege Escalation Vulnerability
Privilege EscalationLocal Privilege Escalation

Built with ❤️ by Shubham Rawat