Skip to content

Commit

Permalink
Update POM file with new version: 1.5.5
Browse files Browse the repository at this point in the history
  • Loading branch information
commjoen committed Sep 28, 2022
1 parent 4161b69 commit ea269c0
Show file tree
Hide file tree
Showing 7 changed files with 13 additions and 12 deletions.
4 changes: 2 additions & 2 deletions Dockerfile.web
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
FROM jeroenwillemsen/wrongsecrets:1.5.4-no-vault
ARG argBasedVersion="1.5.4"
FROM jeroenwillemsen/wrongsecrets:1.5.5-no-vault
ARG argBasedVersion="1.5.5"
ARG CANARY_URLS="http://canarytokens.com/terms/about/s7cfbdakys13246ewd8ivuvku/post.jsp,http://canarytokens.com/terms/about/y0all60b627gzp19ahqh7rl6j/post.jsp"
ARG CTF_ENABLED=false
ARG HINTS_ENABLED=true
Expand Down
11 changes: 6 additions & 5 deletions README.md
Original file line number Diff line number Diff line change
Expand Up @@ -10,7 +10,7 @@ Welcome to the OWASP WrongSecrets p0wnable app. With this app, we have packed va
secrets. These can help you to realize whether your secret management is ok. The challenge is to find all the different
secrets by means of various tools and techniques.

Can you solve all the 24 challenges?
Can you solve all the 25 challenges?
![screenshot.png](screenshot.png)

## Support
Expand All @@ -24,7 +24,7 @@ based project, so it might take a little while before we respond.

## Basic docker exercises

_Can be used for challenges 1-4, 8, 12-24_
_Can be used for challenges 1-4, 8, 12-25_

For the basic docker exercises you currently require:

Expand Down Expand Up @@ -57,6 +57,7 @@ Now you can try to find the secrets by means of solving the challenge offered at
- [localhost:8080/challenge/22](http://localhost:8080/challenge/22)
- [localhost:8080/challenge/23](http://localhost:8080/challenge/23)
- [localhost:8080/challenge/24](http://localhost:8080/challenge/24)
- [localhost:8080/challenge/25](http://localhost:8080/challenge/25)

Note that these challenges are still very basic, and so are their explanations. Feel free to file a PR to make them look
better ;-).
Expand All @@ -82,7 +83,7 @@ spoiling it for others that want to testdrive it.

## Basic K8s exercise

_Can be used for challenges 1-6, 8, 12-24_
_Can be used for challenges 1-6, 8, 12-25_

### Minikube based

Expand Down Expand Up @@ -133,7 +134,7 @@ Don't want to go over the hassle of setting up K8S yourself? visit [https://wron

## Vault exercises with minikube

_Can be used for challenges 1-8, 12-24_
_Can be used for challenges 1-8, 12-25_
Make sure you have the following installed:

- minikube with docker (or comment out line 8 and work at your own k8s setup),
Expand All @@ -153,7 +154,7 @@ vault and not update the secret-challenge application with the new secret.

## Cloud Challenges

_Can be used for challenges 1-24_
_Can be used for challenges 1-25_

**READ THIS**: Given that the exercises below contain IAM privilege escalation exercises,
never run this on an account which is related to your production environment or can influence your account-over-arching
Expand Down
2 changes: 1 addition & 1 deletion aws/k8s/secret-challenge-vault-deployment.yml
Original file line number Diff line number Diff line change
Expand Up @@ -37,7 +37,7 @@ spec:
volumeAttributes:
secretProviderClass: "wrongsecrets-aws-secretsmanager"
containers:
- image: jeroenwillemsen/wrongsecrets:1.5.4-k8s-vault
- image: jeroenwillemsen/wrongsecrets:1.5.5-k8s-vault
imagePullPolicy: IfNotPresent
ports:
- containerPort: 8080
Expand Down
2 changes: 1 addition & 1 deletion azure/k8s/secret-challenge-vault-deployment.yml.tpl
Original file line number Diff line number Diff line change
Expand Up @@ -35,7 +35,7 @@ spec:
volumeAttributes:
secretProviderClass: "azure-wrongsecrets-vault"
containers:
- image: jeroenwillemsen/wrongsecrets:1.5.4-k8s-vault
- image: jeroenwillemsen/wrongsecrets:1.5.5-k8s-vault
imagePullPolicy: IfNotPresent
ports:
- containerPort: 8080
Expand Down
2 changes: 1 addition & 1 deletion fly.toml
Original file line number Diff line number Diff line change
Expand Up @@ -9,7 +9,7 @@ processes = []
dockerfile = "Dockerfile"

[build.args]
argBasedVersion="1.5.4"
argBasedVersion="1.5.5"
spring_profile="without-vault"

[env]
Expand Down
2 changes: 1 addition & 1 deletion gcp/k8s/secret-challenge-vault-deployment.yml.tpl
Original file line number Diff line number Diff line change
Expand Up @@ -37,7 +37,7 @@ spec:
volumeAttributes:
secretProviderClass: "wrongsecrets-gcp-secretsmanager"
containers:
- image: jeroenwillemsen/wrongsecrets:1.5.4-k8s-vault
- image: jeroenwillemsen/wrongsecrets:1.5.5-k8s-vault
imagePullPolicy: IfNotPresent
ports:
- containerPort: 8080
Expand Down
2 changes: 1 addition & 1 deletion okteto/k8s/secret-challenge-deployment.yml
Original file line number Diff line number Diff line change
Expand Up @@ -28,7 +28,7 @@ spec:
runAsGroup: 2000
fsGroup: 2000
containers:
- image: jeroenwillemsen/wrongsecrets:1.5.4-no-vault
- image: jeroenwillemsen/wrongsecrets:1.5.5-no-vault
imagePullPolicy: IfNotPresent
ports:
- containerPort: 8080
Expand Down

0 comments on commit ea269c0

Please sign in to comment.