<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Docker Escape on Chief Dennis' Blog</title><link>https://chiefdennis.github.io/tags/docker-escape/</link><description>Recent content in Docker Escape on Chief Dennis' Blog</description><generator>Hugo</generator><language>en</language><lastBuildDate>Mon, 10 Jun 2024 13:07:16 +0100</lastBuildDate><atom:link href="https://chiefdennis.github.io/tags/docker-escape/index.xml" rel="self" type="application/rss+xml"/><item><title>Runner HTB Walkthrough</title><link>https://chiefdennis.github.io/posts/htb_runner/</link><pubDate>Mon, 10 Jun 2024 13:07:16 +0100</pubDate><guid>https://chiefdennis.github.io/posts/htb_runner/</guid><description>&lt;p>&lt;img src="https://chiefdennis.github.io/posts/htb_runner/Scr_29.png#center" alt="image">&lt;/p>
&lt;p>The Runner HTB machine is a medium difficulty level HackTheBox Machine. The main techniques and tools used to crack this machine are:&lt;/p>
&lt;pre>&lt;code>- Subdirectory discovery with ffuf
- CVE-2024-27198
- Hash cracking with JohnTheRipper
- Docker escape
- CVE-2024-21626
&lt;/code>&lt;/pre>
&lt;h2 id="reconnaissance">
 Reconnaissance
 &lt;a class="heading-link" href="#reconnaissance">
 &lt;i class="fa-solid fa-link" aria-hidden="true" title="Link to heading">&lt;/i>
 &lt;span class="sr-only">Link to heading&lt;/span>
 &lt;/a>
&lt;/h2>
&lt;p>We start a broad Nmap scan by executing the following command:&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-sh" data-lang="sh">&lt;span class="line">&lt;span class="cl">sudo nmap -sS -T5 -vvv -p- 10.10.11.13 -Pn -oG nmap_inicial
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>Where the arguments mean:&lt;/p></description></item></channel></rss>