Container Security

Overview


Room URL: https://tryhackme.com/room/container-security-aoc2025-z0x3v6n9m2
Difficulty: Medium
Category: Containers
Date Completed: 12/14/2025

Objectives


Table of Contents

Introduction
Walk Through
Lessons Learned
Resources


Introduction

DoorDasher's food delivery service has fallen victim to a sophisticated attack—the Hopperoo website now displays defaced content instead of the legitimate service. Your mission is to investigate the Docker infrastructure, identify the security vulnerability, and restore the original application. This challenge demonstrates a critical real-world security risk: improper Docker socket exposure that enables container escape attacks. By exploiting overly permissive container configurations and weak credentials, you'll navigate through multiple containers, escalate privileges, and execute a recovery script to save the day. This hands-on exercise reveals how a single misconfiguration in container isolation settings can cascade into complete infrastructure compromise.


Walk Through

  1. Spin up target machine
  2. Connect to VPN
  3. What exact command lists running Docker containers?
    1. docker ps
  4. What file is used to define the instructions for building a Docker image?
    1. dockerfile
  5. What's the flag?
    1. docker exec -it uptimechecker sh
    2. docker exec -it deployer bash
    3. whoami
    4. pwd
    5. ls
    6. cd ../
    7. ls
    8. cat flag.txt
    9. sudo ./recovery_script.sh
    10. Screenshot 2025-12-14 at 3.00.41 PM.png
  6. Bonus Question: There is a secret code contained within the news site running on port 5002; this code also happens to be the password for the deployer user! They should definitely change their password. Can you find it?
    1. open <website>:5002
    2. DeployMaster2025!
    3. Pasted image 20251214150133.png

Lessons Learned


Resources

TryHackMe
Docker Documentation
Docker Security Best Practices
Container Escape Techniques


Revision #1
Created 2025-12-14 20:04:24 UTC by David Rizzo
Updated 2025-12-14 20:05:41 UTC by David Rizzo