Certified Ethical Hacker (CEH) Practice Question

During a red-team assessment of a public cloud environment, you obtain a shell inside a Docker container that is part of a Kubernetes deployment. You observe that /var/run/docker.sock is mounted read-write inside the container. From the perspective of container escape, which action would most effectively allow you to gain root access on the underlying host?

  • Overwrite the container's /etc/resolv.conf so all DNS queries resolve to an attacker-controlled server on the same VPC subnet.

  • Use the docker.sock to issue API calls that start a new privileged container with the host filesystem mounted, then chroot into it.

  • Read /proc/kallsyms to leak kernel addresses and attempt a local privilege escalation against the node kernel.

  • Insert custom iptables rules inside the container to perform ARP spoofing against other pods on the overlay network.

Certified Ethical Hacker (CEH)
Cloud Computing
Your Score:
Settings & Objectives
Random Mixed
Questions are selected randomly from all chosen topics, with a preference for those you haven’t seen before. You may see several questions from the same objective or domain in a row.
Rotate by Objective
Questions cycle through each objective or domain in turn, helping you avoid long streaks of questions from the same area. You may see some repeat questions, but the distribution will be more balanced across topics.

Check or uncheck an objective to set which questions you will receive.

Bash, the Crucial Exams Chat Bot
AI Bot