visit
Tools & Skills
REPO LINK
GETTING STARTED.
Are you wanting to build a low profile & portable pen-testing lab to assist with building your skills while learning how to use docker containers? Keep on reading! I have built a pair of scripts that will do the following..THE CURRENT CONTAINERS
The the attacker container is built off of the official Kali Linux docker container base image wit the label
Hack_lab
. I decided to just use this in order to keep the image size smaller and portable. (Docker is meant for singular use apps).With this base image, one can install tools that are needed for the job at hand, rather than a 8gb image that might as well be a full VM that resource intensive. For example, If you want to install metasploit in the Kali container, just run the following from within the container
apt-get install metasploit-framework.
The vulnerable containers consist the following.
They are focused on WAP for now, but the goal is to have the list grow and become dynamic in nature.
USAGE
IE: mkdir ~/home/<name>/projects.
If you get really overwhelmed, you can kill all containers (running & stopped) by
doing docker system prune
and using the "y"
option Upcoming Features: