Escape to Host
Adversaries may break out of a container to gain access to the underlying host.
Description
Adversaries may break out of a container to gain access to the underlying host.
Available Mitigations
This technique can be mitigated using 2 documented security measures.
Application Isolation and SandboxingPrivileged Account Management
Quick Info
- Technique ID
- T1611
- Tactic
- Priv Esc
- Mitigations
- 2
