containerd Runtime State and Snapshots
LinuxExecution EvidencecontainerdDisk Image
Location
/var/lib/containerd/, /run/containerd/, /etc/containerd/config.toml, and ctr/crictl metadataDescription
containerd runtime artifacts including namespaces, containers, tasks, snapshots, content-store metadata, runtime sockets, and configuration. Common on Kubernetes nodes and modern container hosts even when Docker is not installed.
Forensic Value
containerd state is essential on current Kubernetes nodes because it records which images, snapshots, and tasks existed even when attacker workloads were short-lived. It helps prove which containers ran, what image digests were used, whether privileged workloads executed, and where writable snapshot data may still hold attacker tooling or exfiltration traces.
Tools Required
ctrcrictlcptar
Collection Commands
ctr
ctr -n k8s.io containers ls > /forensics/output/containerd_containers.txt
ctr
ctr -n k8s.io snapshots ls > /forensics/output/containerd_snapshots.txt
cp
cp /etc/containerd/config.toml /forensics/output/containerd_config.toml 2>/dev/null
tar
tar czf /forensics/output/containerd_state.tar.gz /var/lib/containerd /run/containerd 2>/dev/null
Collection Constraints
- •containerd state is technically dense and can be truncated quickly by garbage collection or node reboots.
- •Runtime state alone should be paired with audit, kubelet, or workload logs to reconstruct operator actions clearly.
MITRE ATT&CK Techniques
T1610T1611T1525