“In theory, theory and practice are the same. In production, attackers get a vote.”
These chains are realistic sequences attackers use. They’re written from a defender’s perspective: entry → escalation → persistence → impact → detection points.
Theme: Mounting docker.sock (or other runtime socket) turns a container into a host admin.

