Originally published by Sysdig. Written by Jason Andress. This is the first article in a series focusing on syscall evasion as a means to work around detection by security tools and what we can do to combat such efforts. Weâll be starting out the series discussing how this applies to Linux operating systems, but this is a technique that applies to Windows as well...
![](https://www.newsnpo.com/storage/2024/06/CVE-2022-23648-Arbitrary-Host-File-Access-from-containers-launched-by-containerd-CRI-and-its-impact-on-Kubernetes-800x450.jpg)