forked from RiceComp427-Spring2018/memoryattack
-
Notifications
You must be signed in to change notification settings - Fork 3
/
Copy pathDockerfile
66 lines (52 loc) · 1.39 KB
/
Dockerfile
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
# From the Kali linux base image
FROM kalilinux/kali-linux-docker
# Update and apt install programs
RUN apt-get update && apt-get install -y \
# exploitdb \
# exploitdb-bin-sploits \
binutils \
git \
gdb \
# gobuster \
# hashcat \
# hydra \
# man-db \
# minicom \
metasploit-framework \
nasm \
python \
python-pip \
vim
# nmap \
# sqlmap \
# sslscan \
# wordlists
# Create known_hosts for git cloning
RUN mkdir /root/.ssh
RUN touch /root/.ssh/known_hosts
# Add host keys
RUN ssh-keyscan bitbucket.org >> /root/.ssh/known_hosts
RUN ssh-keyscan github.com >> /root/.ssh/known_hosts
# Clone git repos
#RUN git clone https://github.com/danielmiessler/SecLists.git /opt/seclists
#RUN git clone https://github.com/PowerShellMafia/PowerSploit.git /opt/powersploit
# Other installs
#RUN pip install pwntools
# Setup ROPPER
RUN git clone https://github.com/sashs/Ropper.git /opt/ropper
RUN pip install capstone filebytes keystone-engine
RUN cd /opt/ropper && python setup.py install
# Update ENV
#ENV PATH=$PATH:/opt/powersploit
# Set entrypoint and working directory
WORKDIR /427hax/
# Copy the contents of this dir to the working dir
# Update ENV
#ENV PATH=$PATH:/opt/powersploit
# Set entrypoint and working directory
WORKDIR /427hax/
# Copy the contents of this dir to the working dir
COPY . /427hax/
RUN cd stacksmash && make
# Source the peda gdb stubs
RUN echo "source /427hax/peda/peda.py" >> ~/.gdbinit