{}escapepod.red

Boxes

Every box, ranked by pain.

Each box is a fully-isolated environment with a real attack surface. No CTF-style flag-hunting through tar files. You get a vulnerable Docker host, k8s cluster, or pipeline — and you root it.

01

Sockmonkey

Coming soon

A mounted docker.sock is a free shell on the host.

docker.sock · privesc · escape

easycontainer escape
02

Privileged

Coming soon

When --privileged was the only flag they read.

capabilities · cgroup · host-mount

easycontainer escape
03

Tiller

Coming soon

Helm 2 left the door wide open.

helm · rbac · cluster-admin

mediumkubernetes offense
04

Anonymous

Coming soon

Anonymous auth on the kubelet API. What could go wrong?

kubelet · exec · node

mediumkubernetes offense
05

Manifest Destiny

Coming soon

Mutating admission webhooks accept the strangest things.

admission-controller · supply-chain

hardkubernetes offense
06

Runaway

Coming soon

Leaky file descriptors, runc, and a kernel.

runc · CVE-2024-21626 · kernel

insanecontainer escape
07

Actions Speak

Coming soon

pull_request_target was a mistake.

github-actions · injection · runner

mediumci/cd compromise
08

Trust Fall

Coming soon

Misconfigured OIDC trust = AWS keys for free.

oidc · aws · trust-policy

hardci/cd compromise

22 more boxes incoming

First wave drops with public launch. Founding members get early access.