An attack technique where an attacker breaks out of a containerized environment (e.g., Docker) to gain access to the host system or other containers.
Put theory into practice with real hacking labs, CTF challenges, and guided courses on Parrot CTFs Events.
Get Started Free