• Stars
    star
    324
  • Rank 129,708 (Top 3 %)
  • Language
    Vim Script
  • Created over 8 years ago
  • Updated over 3 years ago

Reviews

There are no reviews yet. Be the first to send feedback to the community and the maintainers!

Repository Details

Docker container with tools for binary reverse engineering and exploitation.

About

Pwnbox is a Docker container with tools for binary reverse engineering and exploitation. It's primarily geared towards Capture The Flag competitions.

Installation

You can grab the container from Docker Hub: docker pull superkojiman/pwnbox

  1. You need to have jq installed. See https://stedolan.github.io/jq/ for installation details.
  2. Optional: Create a ./rc directory. Your custom configuration files in $HOME go here. Eg: .gdbinit, .radare2rc, .bashrc, .vimrc, etc. The contents of rc gets copied into /root on the container.
  3. Execute run.sh script and pass it the name of the container. Eg: sudo ./run.sh my_ctf. This will create a volume for your container drop you into a tmux session.
  4. If you detach or quit the container, you can re-attach to it by using sudo docker start my_ctf && ./my_ctf-attach.sh.
  5. You can delete the volume and container using sudo ./my_ctf-stop.sh.

Limitations

  1. If you need to edit anything in /proc, you must edit run.sh to use the --privileged option to docker instead of --security-opt seccomp:unconfined.
  2. The container is designed to be isolated so no directories are mounted from the host. This allows you to have multiple containers hosting files from different CTFs.

Go forth, and CTF

β€’_β€’)

( β€’_β€’)>βŒβ– -β– 

(βŒβ– _β– )