Chains
TTPs
Blog
Login
Container
Every week, the Prelude team designs, builds and chains together TTPs. These chains, which mimic real-world cyberattacks, can be safely used to test your internal defenses. These chains are all usable in Prelude Operator.
Related Prelude themed chains
Release Date (Newest)
Filter
Search for chains, TTPs, themes, and text
Browse By:
Platforms
All
Windows
Darwin
Linux
Global
Android
Tactics & Techniques
All
Resource Development
Initial Access
Defense Evasion
Command And Control
Discovery
Collection
Persistence
Credential Access
Privilege Escalation
Lateral Movement
Execution
Exfiltration
Impact
Tags
Licenses
Is my Kubernetes pod protected against host mounting?
2022-11-29
Escape Kubernetes Pod via host filesystem mounting.
Is my Docker daemon vulnerable to privilege escalation?
2022-11-15
Privilege escalation through exposed Docker daemon.
Is my Docker container vulnerable to cgroup controller escapes?
2022-11-08
Escape Docker container via cgroup controller.
Is my Docker container vulnerable to host filesystem mounting?
2022-11-01
Escape Docker container by mounting host filesystem.
Is my Docker container vulnerable to a Docker socket escape?
2022-10-25
Escape a Docker container that has the Docker socket mounted.
1