- Build the images and create the Docker Compose architecture:
docker-compose up --force-recreate --build
- Check the version of the vulnerable server:
docker exec --interactive --tty server apachectl -v
- Enter the attacker's container:
docker exec --interactive --tty attacker /bin/bash
- Run the exploit script by providing the DNS record of the vulnerable server (automatically generated when linking the two container) and a command to execute:
/root/exploit.sh server whoami
- Exit the container:
exit
- Remove the infrastructure:
docker-compose rm -f
This repository has been archived by the owner on Feb 14, 2023. It is now read-only.
demo
Folders and files
Name | Name | Last commit date | ||
---|---|---|---|---|
parent directory.. | ||||