Categories: Kali Linux

Microctfs – Small CTF challenges running on Docker

Microctfs is a tool for small CTF challenges running on Docker.

Microctfs Logviewer

Build and Start logviewer challenge exposed on port 8000

cd logviewer
docker build -t logviewer . 
docker run -d -p 8000:80 --name log_challenge logviewer

Restart logviewer challenge

docker rm -f log_challenge && docker run -d -p 8000:80 --name log_challenge logviewer

Stop logviewer challenge

docker rm -f log_challenge

Also Read UBoat – A POC HTTP Botnet Project

SQLI

Build and Start sqli challenge exposed on port 8883

cd sqli
docker build -t sqli . 
docker run -d -p 8883:80 --name sqli_chal sqli

Restart sqli challenge

docker rm -f sqli_chal && docker run -d -p 8883:80 --name sqli_chal sqli

Stop sqli challenge

docker rm -f sqli_chal

tcmanager

Build and Start tcmanager challenge exposed on port 8080

cd tcmanager
docker build -t tcmanager . 
docker run -d -p 8080:8080 --name tc_chal tcmanager

Restart tcmanager challenge

docker rm -f tc_chal && docker run -d -p 8080:8080 --name tc_chal tcmanager

Stop tcmanager challenge

docker rm -f tc_chal

geddy

Build and Start geddy challenge exposed on port 40000

cd geddy
docker build -t geddy . 
docker run -d -p 40000:4000 --name geddy_chal geddy

Restart geddy challenge

docker rm -f geddy_chal && docker run -d -p 40000:4000 --name geddy_chal geddy

Stop geddy challenge

docker rm -f geddy_chal

printf

Build and Start printf challenge exposed on port 1337

cd printf
docker build -t printf .
docker run -d -p 1337:1337 --name printfchal printf

Restart printf challenge

docker rm -f printfchal && docker run -d -p 1337:1337 --name printfchal printf

Stop geddy challenge

docker rm -f printfchal

xxe

Build and Start xxe challenge exposed on port 8080

cd xxe
docker build -t xxe .
docker run -d -p 8080:8080 xxe mvn jetty:run

Credit : noreply@blogger.com (Lydecker Black)

R K

Recent Posts

How to Prevent Software Supply Chain Attacks

What is a Software Supply Chain Attack? A software supply chain attack occurs when a…

2 days ago

How UDP Works and Why It Is So Fast

When people ask how UDP works, the simplest answer is this: UDP sends data quickly…

2 weeks ago

How EDR Killers Bypass Security Tools

Endpoint Detection and Response (EDR) solutions have become a cornerstone of modern cybersecurity, designed to…

2 weeks ago

AI-Generated Malware Campaign Scales Threats Through Vibe Coding Techniques

A large-scale malware campaign leveraging AI-assisted development techniques has been uncovered, revealing how attackers are…

2 weeks ago

How Does a Firewall Work Step by Step

How Does a Firewall Work Step by Step? What Is a Firewall and How Does…

2 weeks ago

Fake VPN Download Trap Can Steal Your Work Login in Minutes

People trying to securely connect to work are being tricked into doing the exact opposite.…

2 weeks ago