Project Home
Https://github.com/Medicean/VulApps
Project Introduction
Collect all kinds of vulnerability environment, unify adopt Dockerfile form. DockerHub Online Mirror Address
Get and use the associated image
Pull the relevant image directly using the Docker command and start. Need to see the tag of the relevant environment
If the acquisition speed is slow, we recommend using Zhong ke Docker mirrors
Take Struts2 s2-037 Vulnerability environment as an example: Get the Mirror:
Docker pull Medicean/vulapps:s_struts2_s2-037 Create and start the container:
:8080 medicean/vulapps:s_struts2_s2-037
Parameter description:-D indicates that the daemon is running the container in the back-to-p 80:8,080 to map the container's 8080 port to the 80 port of the machine (the preceding 80 represents the port of the physical machine and can be arbitrarily specified.) )
Image Tag and path naming rules
Path:/ component initials / component name / Specific Vulnerability name
Tag: path name full lowercase, path split selector rate replaced by underscore
For example Struts2 s2-037 Vulnerability Environment , the path is /s/struts2/s2-037, so Tag is: s_struts2_s2-037
Use:
访问 http://你的 IP 地址:端口号/
Note:
Kali installing Dockerapt-get updateapt Install Docker.io
Vulnerability environment
- Bash
- ImageMagick
- Openssl
- Struts2
- Wordpress
- Zabbix
Use Vulapps to quickly build various vulnerability environments