Phantom — Post-Exploitation & Container Escape
Phantom is the second BreachLab track. Ghost ended at “you got a shell”. Phantom starts there. Twenty-one levels teach the full discipline of post-exploitation: Linux privilege escalation, container escape on modern runtimes, Kubernetes pod escape, and kubectl-free cluster pivot — the exact chain a real operator runs against a real compromised pod in a real 2026 incident.
Who this is for
Operatives who have already finished Ghost or can do equivalent work on a fresh Linux box without thinking. Phantom assumes you already live in a shell — it will not teach you how to move a file or read a log. Phantom teaches what happens after, and it does not soften the 2026 reality: container runtimes, Linux capabilities, cgroups, Kubernetes service account tokens, and the specific runc, polkit, and sudo CVEs that still matter this year.
Difficulty tiers
Every Phantom level is labelled with one of four tiers. Each tier changes one thing about how you approach the level.
- RECRUITSingle primitive, mitigations off, reachable in under fifteen minutes if you know the concept. No hints. Five levels.
- OPERATORMitigations on, realistic 2026 hardening, 2–3 step chains. A single “show approach” hint unlocks after twenty minutes — category-only, never commands. Eight levels. This is the honest learning zone.
- PHANTOMRecent-CVE, chained, prestige-grade. No hints. Six levels covering the full modern container-escape surface.
- GRADUATEKubectl-free Kubernetes escape and the final chained graduation lab. Two levels. One earns you the Phantom Operative badge and a signed certificate.
What Phantom makes of you
Twenty public levels plus one hidden graduation. After Phantom you can:
- Walk onto any Linux host you have unprivileged access on and list the five realistic privilege-escalation paths in under ten minutes.
- Identify dangerous sudo rules (NOPASSWD, env_keep, wildcard injection, sudoedit quirks) and turn them into root in one attempt.
- Read Linux capabilities and know which ones are trivially exploitable with a one-liner script.
- Exploit classic local authentication services when they ship broken — the CVEs every Linux desktop inherits.
- Attach to a running root process with live code injection using the debugger interface alone.
- Recognise that you are inside a container, enumerate the container runtime, and pick the fastest escape path given the current misconfigurations.
- Escape a container through a mounted control socket, a “privileged” flag, a legacy cgroup interface, a runtime-level CVE replay, and the 2024 headline file-descriptor leak — five distinct techniques.
- Escape a Kubernetes pod using misconfigured host-namespace flags and land in the host’s init process namespace.
- Reach the Kubernetes API from inside a pod using only curl and a service account token, create a privileged workload, and harvest secrets from the control plane.
- Collect cloud IAM credentials from a node’s metadata service — and understand exactly where Phantom ends and the Mirage cloud track begins.
SSH Information
- Host:
- phantom.breachlab.org
- Port:
- 2223
- User:
- phantom0 (level 0)
- Password:
- phantom0
ssh [email protected] -p 2223
SSH endpoint is being provisioned. Platform content and tooling are live; the vulnerable infrastructure container ships in the next ops sprint. Follow @BreachLab for launch announcement.
Levels
| # | Level | Points | First Blood | Status |
|---|---|---|---|---|
| 0 | Recon Gateway | 300 | FIRST BLOOD AVAILABLE | — |
| 1 | Sudo Allowlist | 320 | FIRST BLOOD AVAILABLE | — |
| 2 | Preload | 340 | FIRST BLOOD AVAILABLE | — |
| 3 | Wild Card | 360 | FIRST BLOOD AVAILABLE | — |
| 4 | Edit Escape | 380 | FIRST BLOOD AVAILABLE | — |
| # | Level | Points | First Blood | Status |
|---|---|---|---|---|
| 5 | Local Authority | 420 | FIRST BLOOD AVAILABLE | — |
| 6 | Capable Interpreter | 460 | FIRST BLOOD AVAILABLE | — |
| 7 | Read Everything | 500 | FIRST BLOOD AVAILABLE | — |
| 8 | Live Injection | 540 | FIRST BLOOD AVAILABLE | — |
| 9 | Writable Rules | 580 | FIRST BLOOD AVAILABLE | — |
| 10 | Writable Authority | 620 | FIRST BLOOD AVAILABLE | — |
| 11 | Schedule Hijack | 660 | FIRST BLOOD AVAILABLE | — |
| 12 | Group Privilege | 700 | FIRST BLOOD AVAILABLE | — |
| # | Level | Points | First Blood | Status |
|---|---|---|---|---|
| 13 | The Socket | 800 | FIRST BLOOD AVAILABLE | — |
| 14 | Privileged | 860 | FIRST BLOOD AVAILABLE | — |
| 15 | Release Agent | 920 | FIRST BLOOD AVAILABLE | — |
| 16 | Self Exe | 980 | FIRST BLOOD AVAILABLE | — |
| 17 | Leaky Vessels | 1040 | FIRST BLOOD AVAILABLE | — |
| 18 | Bad Pod | 1100 | FIRST BLOOD AVAILABLE | — |
| # | Level | Points | First Blood | Status |
|---|---|---|---|---|
| 19 | Kubelet Door | 1200 | FIRST BLOOD AVAILABLE | — |
Log in to submit flags and track progress.