- build the image
- run the container with port forwarding
- ssh -X into it
- run evince executeonly_bypass.ps
- check exploit has written into ~/.bashrc
[4.0K] /data/pocs/d9d23b59b4837118741f6770505e9cb5c0461a71
├── [1.2K] Dockerfile
├── [2.0K] executeonly_bypass_ps.bin
└── [ 154] README.md
0 directories, 3 files