-
You can deploy pwn challenges rapidly
-
You may modify the directory's name to whatever you want, but you should modify the Dockerfile as well as ctf config
First, change your binary and flag into ctf-pwn directory
git clone https://github.com/r3dhun9/EasyPwnDeploy.git ~/EasyPwnDeploy
cd ~/EasyPwnDeploy/ctf-pwn
vim flag # modify your flag
vim run.sh # modify ${this_is_your_binary}
rm this_is_your_binary # replace the binary into yours
Second, build the challenge's image from Dockerfile
cd ~/EasyPwnDeploy
sudo docker build -t ${your_image_name} . --no-cache
And lastly, run this command
sudo docker run --name ${your_containers_name} -d -p ${your_port}:9999 -it ${your_images_name} /bin/bash -c "/usr/sbin/xinetd -dontfork"
- You should restart the container every month or every week
- Add your restart script into your crontab is a good choice
- using tcpdump to check the exploits