CHAPTER 29

Hacking Containers

In this chapter, we cover the following topics:

•   Linux containers

•   Applications, specifically Docker

•   Container security

•   Kernel capabilities

Linux containers have been a mainstay of application deployment technologies for quite some time. The use of containers is not a very new idea, although it may seem that way. For decades, container-type technologies have shown up in IBM mainframes and Sun Solaris machines. It does, however, feel that modern containers are different. The term container has become an overloaded term like a sandbox. Linux containers are particular constructs that have been refined over time. When we refer to “containers,” it is essential to note that we are referring to Linux-based ...

Get Gray Hat Hacking: The Ethical Hacker's Handbook, Sixth Edition, 6th Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.