πŸ›‘οΈ Challenge 08 β€’ Container Escape Detection

Offline Level 8 - Advanced Docker & Kubernetes Security
πŸ’‘ Next Hint: 30s

Mission Brief

Your Kubernetes security monitoring system flagged suspicious activity from container web-app-7f9c4b running in namespace production at 14:30 UTC on November 28, 2025. Container runtime logs show unusual /proc filesystem access, privileged operations, and host filesystem mounting attempts. Your mission is to analyze Docker/Kubernetes logs to determine if a container escape was attempted or achieved.

⚠️ ADVANCED CHALLENGE - CONTAINER SECURITY
This challenge involves detecting sophisticated container escape techniques. All log data, container IDs, and escape attempts are synthetically generated for training. Container escapes are critical vulnerabilities in cloud-native environments.

Available Artifacts

  • docker logs – Container stdout/stderr output
  • docker inspect – Container configuration and capabilities
  • /var/log/syslog – Host system events during escape
  • kubectl describe pod – Kubernetes pod security context

Learning Objectives

  • Detect privileged container misconfigurations
  • Identify container breakout techniques
  • Analyze Linux capabilities abuse
  • Recognize host filesystem access from containers
  • Understand namespace and cgroup escapes
  • Map container attacks to MITRE ATT&CK