Categories: Kali Linux

Microctfs – Small CTF challenges running on Docker

Microctfs is a tool for small CTF challenges running on Docker.

Microctfs Logviewer

Build and Start logviewer challenge exposed on port 8000

cd logviewer
docker build -t logviewer . 
docker run -d -p 8000:80 --name log_challenge logviewer

Restart logviewer challenge

docker rm -f log_challenge && docker run -d -p 8000:80 --name log_challenge logviewer

Stop logviewer challenge

docker rm -f log_challenge

Also Read UBoat – A POC HTTP Botnet Project

SQLI

Build and Start sqli challenge exposed on port 8883

cd sqli
docker build -t sqli . 
docker run -d -p 8883:80 --name sqli_chal sqli

Restart sqli challenge

docker rm -f sqli_chal && docker run -d -p 8883:80 --name sqli_chal sqli

Stop sqli challenge

docker rm -f sqli_chal

tcmanager

Build and Start tcmanager challenge exposed on port 8080

cd tcmanager
docker build -t tcmanager . 
docker run -d -p 8080:8080 --name tc_chal tcmanager

Restart tcmanager challenge

docker rm -f tc_chal && docker run -d -p 8080:8080 --name tc_chal tcmanager

Stop tcmanager challenge

docker rm -f tc_chal

geddy

Build and Start geddy challenge exposed on port 40000

cd geddy
docker build -t geddy . 
docker run -d -p 40000:4000 --name geddy_chal geddy

Restart geddy challenge

docker rm -f geddy_chal && docker run -d -p 40000:4000 --name geddy_chal geddy

Stop geddy challenge

docker rm -f geddy_chal

printf

Build and Start printf challenge exposed on port 1337

cd printf
docker build -t printf .
docker run -d -p 1337:1337 --name printfchal printf

Restart printf challenge

docker rm -f printfchal && docker run -d -p 1337:1337 --name printfchal printf

Stop geddy challenge

docker rm -f printfchal

xxe

Build and Start xxe challenge exposed on port 8080

cd xxe
docker build -t xxe .
docker run -d -p 8080:8080 xxe mvn jetty:run

Credit : noreply@blogger.com (Lydecker Black)

R K

Recent Posts

How EDR Killers Bypass Security Tools

Endpoint Detection and Response (EDR) solutions have become a cornerstone of modern cybersecurity, designed to…

9 hours ago

AI-Generated Malware Campaign Scales Threats Through Vibe Coding Techniques

A large-scale malware campaign leveraging AI-assisted development techniques has been uncovered, revealing how attackers are…

10 hours ago

How Does a Firewall Work Step by Step

How Does a Firewall Work Step by Step? What Is a Firewall and How Does…

15 hours ago

Fake VPN Download Trap Can Steal Your Work Login in Minutes

People trying to securely connect to work are being tricked into doing the exact opposite.…

2 days ago

This Android Bug Can Crack Your Lock Screen in 60 Seconds

A newly disclosed Android vulnerability is making noise for a good reason. Researchers showed that…

5 days ago

How to Fix MyISAM Table Corruption in MySQL?

In MySQL Server 5.5 and earlier versions, the MyISAM was the default storage engine. So,…

7 days ago