A docker image to hold pwn challenges in ctf war
This image contains xinetd to provide remote access services for pwn challenges, and also contains tcpdump to dump network traffics into pcap file.
Notice:
- we use a modified xinetd version from our team to restrict syscalls called by xinetd services.
In order to use this feature, docker container must run withNo more--privileged
option.--privileged
needed now. - This docker image will produce docker volume each you create container from it. Better specify one using
-v your_dump_volume:/var/lib/tcpdump
.
Please check Dockerfile.example
Key | Default Value | Description |
---|---|---|
TCPDUMP_ENABLE | (empty) | Whether enable tcpdump or not |
TCPDUMP_DIR | /var/lib/tcpdump | Directory to write dump files (name=capture-$timestr.pcap) |
TCPDUMP_ROTATE_SEC | 600 | Rotate time interval of capture file |
CTF_PORT | 20000 | Port to capture traffic from |
- Please DO NOT use your own start CMD or entrypoint for this docker image. If you really need to change it, please check phusion/baseimage for more details.