Categories: Kali Linux

Microctfs – Small CTF challenges running on Docker

Microctfs is a tool for small CTF challenges running on Docker.

Microctfs Logviewer

Build and Start logviewer challenge exposed on port 8000

cd logviewer
docker build -t logviewer . 
docker run -d -p 8000:80 --name log_challenge logviewer

Restart logviewer challenge

docker rm -f log_challenge && docker run -d -p 8000:80 --name log_challenge logviewer

Stop logviewer challenge

docker rm -f log_challenge

Also Read UBoat – A POC HTTP Botnet Project

SQLI

Build and Start sqli challenge exposed on port 8883

cd sqli
docker build -t sqli . 
docker run -d -p 8883:80 --name sqli_chal sqli

Restart sqli challenge

docker rm -f sqli_chal && docker run -d -p 8883:80 --name sqli_chal sqli

Stop sqli challenge

docker rm -f sqli_chal

tcmanager

Build and Start tcmanager challenge exposed on port 8080

cd tcmanager
docker build -t tcmanager . 
docker run -d -p 8080:8080 --name tc_chal tcmanager

Restart tcmanager challenge

docker rm -f tc_chal && docker run -d -p 8080:8080 --name tc_chal tcmanager

Stop tcmanager challenge

docker rm -f tc_chal

geddy

Build and Start geddy challenge exposed on port 40000

cd geddy
docker build -t geddy . 
docker run -d -p 40000:4000 --name geddy_chal geddy

Restart geddy challenge

docker rm -f geddy_chal && docker run -d -p 40000:4000 --name geddy_chal geddy

Stop geddy challenge

docker rm -f geddy_chal

printf

Build and Start printf challenge exposed on port 1337

cd printf
docker build -t printf .
docker run -d -p 1337:1337 --name printfchal printf

Restart printf challenge

docker rm -f printfchal && docker run -d -p 1337:1337 --name printfchal printf

Stop geddy challenge

docker rm -f printfchal

xxe

Build and Start xxe challenge exposed on port 8080

cd xxe
docker build -t xxe .
docker run -d -p 8080:8080 xxe mvn jetty:run

Credit : noreply@blogger.com (Lydecker Black)

R K

Recent Posts

Shadow-rs : Harnessing Rust’s Power For Kernel-Level Security Research

shadow-rs is a Windows kernel rootkit written in Rust, demonstrating advanced techniques for kernel manipulation…

1 week ago

ExecutePeFromPngViaLNK – Advanced Execution Of Embedded PE Files via PNG And LNK

Extract and execute a PE embedded within a PNG file using an LNK file. The…

2 weeks ago

Red Team Certification – A Comprehensive Guide To Advancing In Cybersecurity Operations

Embark on the journey of becoming a certified Red Team professional with our definitive guide.…

3 weeks ago

CVE-2024-5836 / CVE-2024-6778 : Chromium Sandbox Escape via Extension Exploits

This repository contains proof of concept exploits for CVE-2024-5836 and CVE-2024-6778, which are vulnerabilities within…

3 weeks ago

Rust BOFs – Unlocking New Potentials In Cobalt Strike

This took me like 4 days (+2 days for an update), but I got it…

3 weeks ago

MaLDAPtive – Pioneering LDAP SearchFilter Parsing And Security Framework

MaLDAPtive is a framework for LDAP SearchFilter parsing, obfuscation, deobfuscation and detection. Its foundation is…

3 weeks ago