0x Preface
Recommend an open source vulnerability shooting range environment Vulhhub
Vulhub-some docker-compose files for vulnerabilities environment
Vulhub is a public open-source vulnerability shooting range that requires no Docker knowledge and simply executes two commands to compile and run a full exploit range image.
0x1 Installation
Project Address: Https://github.com/Cherishao/vulhub
Install the Docker/docker-compose under ubuntu16.04:
# install PIP
curl-s https://bootstrap.pypa.io/get-pip.py | python3
# Install the latest version of Docker
Curl-s https:// get.docker.com/| SH
# Start Docker Services service
Docker start
# Install Compose
Other operating systems may have a slightly different installation of Docker and Docker-compose, please read the Docker documentation for installation. 0x2 Usage
# Pull Project
git clone git@github.com:phith0n/vulhub.git
cd vulhub
# Enter a vulnerability/environment directory
CD Nginx_php5_mysql
# Automated compilation environment
Docker-compose build
# Launches the entire environment
Docker-compose up-d
Each environment directory has a corresponding documentation, please read the file for vulnerability/environment testing.
After the test is complete, delete the entire environment
Docker-compose down
0x3 Suggestion
Each vulnerability environment in this project is accompanied by documentation, it is recommended that you purchase 1G of memory VPS Build vulnerability test environment, the document said Your-ip refers to your VPS IP address, if you are using virtual machine to build a test environment, refers to your virtual machine IP, not the IP inside the Docker container, please do not confuse.