containerd socket exploitation part 3
This is the third and final part in my series on exploiting access to the containerd socket.
More …This is the third and final part in my series on exploiting access to the containerd socket.
More …This is the second part of my series on containerd socket exploitation. The first part in the series is here, which covered how to exploit the containerd socket using the ctr
command line tool.