Skip to content

Commit

Permalink
Por scan scenario with NMAP.
Browse files Browse the repository at this point in the history
  • Loading branch information
guillermodotn committed May 30, 2024
1 parent e6aea43 commit 4964f28
Show file tree
Hide file tree
Showing 4 changed files with 45 additions and 22 deletions.
1 change: 1 addition & 0 deletions .gitignore
Original file line number Diff line number Diff line change
Expand Up @@ -5,6 +5,7 @@ wirehark_docker.yml
./*.log
labs
test_dorothea.py
flow-captures.csv

# Ignore autogenerated resources
containers/hostile_node/node_daemon.py
Expand Down
12 changes: 12 additions & 0 deletions Dockerfile.kali-port-scan
Original file line number Diff line number Diff line change
@@ -0,0 +1,12 @@
# Attacker
FROM kalilinux/kali-last-release:latest

ENV DEFAULT_NETWORK=172.17.0.0/16

# Install nmap package
RUN apt-get update && \
apt-get install -y \
nmap

# Run the nmap scan against vulnerable nodes
CMD nmap -p0- -v -A -T4 ${DEFAULT_NETWORK}
32 changes: 32 additions & 0 deletions docker-compose.port-scan.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,32 @@
name: dorothea

services:
pmacct-probe:
build:
context: .
dockerfile: Dockerfile.dorothea
network_mode: "host"
volumes:
- .:/dorothea

# YOUR ACTIONS: Remove the example service below and add your own
guinea-pig:
image: vulnerables/web-dvwa:latest
network_mode: "bridge"
ports:
- "80:80"
healthcheck:
test: ["CMD-SHELL", "ls /var/log/apache2/other_vhosts_access.log || exit 1"]
interval: 10s
timeout: 5s
retries: 5

attacker:
build:
context: .
dockerfile: Dockerfile.kali-port-scan
network_mode: "bridge"
depends_on:
guinea-pig:
condition: service_healthy

22 changes: 0 additions & 22 deletions docker-compose.yml

This file was deleted.

0 comments on commit 4964f28

Please sign in to comment.