Certified Ethical Hacker (CEH) Practice Question

While assessing a cloud-hosted micro-services platform, you obtain a shell inside one of its Docker containers. The container was started with the --privileged flag and the host's /var/run/docker.sock is mounted inside the container. What is the most straightforward way to escalate to root on the underlying host?

  • Copy the container's /etc/shadow file and crack the root password offline to log in to the host via SSH.

  • Use the Docker client in the compromised container to start a new image with the host's root filesystem and namespaces mounted, then chroot into it for a host-level root shell.

  • Exploit a known Linux kernel privilege-escalation flaw such as Dirty COW from inside the container.

  • Perform ARP spoofing on the Docker bridge network to hijack traffic from other containers and pivot to the host.

Certified Ethical Hacker (CEH)
Cloud Computing
Your Score:
Settings & Objectives
Random Mixed
Questions are selected randomly from all chosen topics, with a preference for those you haven’t seen before. You may see several questions from the same objective or domain in a row.
Rotate by Objective
Questions cycle through each objective or domain in turn, helping you avoid long streaks of questions from the same area. You may see some repeat questions, but the distribution will be more balanced across topics.

Check or uncheck an objective to set which questions you will receive.

Bash, the Crucial Exams Chat Bot
AI Bot