From 6c205753a39a33ce04e15cbd5f70c4e8ad4f0efe Mon Sep 17 00:00:00 2001 From: Wes Widner Date: Sat, 27 Jun 2020 14:57:50 -0400 Subject: [PATCH] More lint fixes --- .travis.yml | 2 +- README.md | 5 +++-- 2 files changed, 4 insertions(+), 3 deletions(-) diff --git a/.travis.yml b/.travis.yml index 016a3c6..d8f374f 100644 --- a/.travis.yml +++ b/.travis.yml @@ -4,4 +4,4 @@ rvm: before_script: - gem install awesome_bot script: - - awesome_bot README.md --white-list 'www.linkedin.com,netflixtechblog.com' \ No newline at end of file + - awesome_bot README.md --white-list 'www.linkedin.com,netflixtechblog.com,sysdig.com,cdn.rawgit.com' \ No newline at end of file diff --git a/README.md b/README.md index 471c10d..d351f61 100644 --- a/README.md +++ b/README.md @@ -218,9 +218,10 @@ A collection of container related security resources ### [harpoon](https://github.com/ProfessionallyEvil/harpoon) * Post exploitation framework -### [waitid](https://www.twistlock.com/labs-blog/escaping-docker-container-using-waitid-cve-2017-5123/) +### [waitid](https://youtu.be/IdRDFS4u2rQ) * CVE-2017-5123 * Privledge escalation using the waitid syscall +* [Detailed write-up](https://salls.github.io/Linux-Kernel-CVE-2017-5123/) ### [nsenter](https://coderwall.com/p/xwbraq/attach-to-your-docker-containers-with-ease-using-nsenter) * This isn't an exploit but it allows user to access the host VM if run in privileged mode @@ -250,7 +251,7 @@ A collection of container related security resources ------------------------------------------------------------------------------------------ -### [How I capture and monitor Wordpress attacks](https://medium.com/@SecurityBender/how-i-capture-and-monitor-wordpress-attacks-ceda512b07) +### [How I capture and monitor Wordpress attacks](https://medium.com/@misc_heading/how-i-capture-and-monitor-wordpress-attacks-ceda512b07) * Capturing exploit attempts by emulating a Wordpress box ### [DShield](https://github.com/xme/dshield-docker)