https://github.com/64j0/python-backdoor-dockerized
The goal of this project is to provide a dockerized python backdoor demo which is lightweight and easy to setup.
https://github.com/64j0/python-backdoor-dockerized
Last synced: about 2 months ago
JSON representation
The goal of this project is to provide a dockerized python backdoor demo which is lightweight and easy to setup.
- Host: GitHub
- URL: https://github.com/64j0/python-backdoor-dockerized
- Owner: 64J0
- Created: 2022-07-24T15:16:40.000Z (almost 3 years ago)
- Default Branch: master
- Last Pushed: 2022-09-04T14:15:44.000Z (over 2 years ago)
- Last Synced: 2025-02-24T01:42:20.737Z (2 months ago)
- Language: Python
- Size: 357 KB
- Stars: 1
- Watchers: 1
- Forks: 0
- Open Issues: 0
-
Metadata Files:
- Readme: README.org
Awesome Lists containing this project
README
#+TITLE: Python Backdoor Dockerized
#+AUTHOR: 64J0
#+DATE: [2022-07-24 dom]This project is a continuation idea for the backdoor project implemented during
the *Complete Ethical Hacking Bootcamp 2022: Zero to Mastery* Udemy course.The main addition is the dockerization of the project, letting it run in a very
lightweight environment composed basically of Docker containers. During the
development of this project, I'm also getting more acquainted with Docker
internal configuration, especially related to the network.Versions tested:
+ Docker version ~20.10.17~
+ docker-compose version ~1.29.1~** How to run it?
If you have the required tools installed, you can run this project with the
following commands:#+begin_src bash
# First, start the attacker container.
# You must use the docker-compose command so it will set up the
# network configuration automatically.
docker-compose run --entrypoint="bash" attacker
# In the shell open, run the python command:
python server.py
#
# Here you'll be able to run commands executed in the target
# environment.
# Notice that it takes 20 seconds before the target tries to connect
# to the attacker.# ====================================
# In a different shell, start the target container if it's not running
# yet.
docker-compose up target# ====================================
# Kill everything:
# docker-compose down
#+end_src*** Example
#+CAPTION: Example of commands running from the attacker container to the target container
#+NAME: example.jpg
[[./assets/example.jpg]]** Legal
Notice that I created this project for personal educational purposes only, and
I'm not responsible for its misusage, or for enhanced variants created.