etn0tw

Results 3 issues of etn0tw

在5.3. 创建 cgroup 进行容器逃逸中提到了的思路为“借助上面 lxcfs 的思路,复用到 sys_admin 或特权容器的场景上读写母机上的文件” 在宿主机 kali2020(Linux localhost.localdomain 5.7.0-kali1-amd64 #1 SMP Debian 5.7.6-1kali2 (2020-07-01) x86_64 GNU/Linux) docker version: 20.10.11+dfsg1 镜像为centos8.4.2105 中复现该操作 ![image](https://user-images.githubusercontent.com/66959925/236614265-3e943f54-9941-4ea9-8a63-bec7265d98c4.png) ![image](https://user-images.githubusercontent.com/66959925/236614427-4f9bf0f6-e81f-4fad-8455-9246d2e2443f.png) 发现No such device or...

右键浏览器打开 会请求http://http//xxxxxx的情况 ![image](https://github.com/G3et/Search_Viewer/assets/66959925/e81705e1-ff7c-4486-9f7e-782c42bd5605) ![image](https://github.com/G3et/Search_Viewer/assets/66959925/3d04520a-529a-4dd7-bebc-3b09d89cf5c0)

从博客看到尝试的,不知道是不是我操作哪里有问题? 环境 tomcat-8.5.82 jdk1.8.0_241 1、shell payload: ![image](https://github.com/yzddmr6/As-Exploits/assets/66959925/f27f7d90-bc09-4390-8066-814ced729a09) ![image](https://github.com/yzddmr6/As-Exploits/assets/66959925/0a4bd7ee-37d6-4f5d-b399-344f1044cec7) 2、shell payload: ![image](https://github.com/yzddmr6/As-Exploits/assets/66959925/c2f9e9b4-07e0-4be5-af99-564c6be57b45) ![image](https://github.com/yzddmr6/As-Exploits/assets/66959925/94f4d9ec-043a-474a-8345-05b9741decb7) 3、shell payload: ![image](https://github.com/yzddmr6/As-Exploits/assets/66959925/6dc4f2e9-0a2e-46c3-a708-6e494eea12ef) ![image](https://github.com/yzddmr6/As-Exploits/assets/66959925/235402a9-dcb4-44d1-9846-ed1b0633a40e)