2375 - Docker
Run docker commands against a docker host to verify if it accepts unauthenticated communication or not.
If it allows unauthenticated communication you can most likely own the host device by creating a new container and mounting the root filesystem.
Last updated