Snooping sensitive information from a docker registry led to a foothold. Privilege escalation was exploiting a local Restic backup.
Snooping sensitive information from a docker registry led to a foothold. Privilege escalation was exploiting a local Restic backup.