Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/davevs/dvxte
Damn Vulnerable eXtensive Training Environment
https://github.com/davevs/dvxte
docker training vulnerable
Last synced: 24 days ago
JSON representation
Damn Vulnerable eXtensive Training Environment
- Host: GitHub
- URL: https://github.com/davevs/dvxte
- Owner: davevs
- License: mit
- Created: 2017-02-26T13:46:39.000Z (almost 8 years ago)
- Default Branch: master
- Last Pushed: 2022-03-15T09:36:19.000Z (over 2 years ago)
- Last Synced: 2024-08-04T00:03:35.598Z (4 months ago)
- Topics: docker, training, vulnerable
- Language: Dockerfile
- Homepage:
- Size: 757 KB
- Stars: 103
- Watchers: 8
- Forks: 38
- Open Issues: 21
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
- awesome-hacking-lists - davevs/dvxte - Damn Vulnerable eXtensive Training Environment (Dockerfile)
README
# Current status: works again!
## Background
When I started at Xebia in 2015, Docker was hip and new and I wanted to understand it better. As I was getting tired of continuously rebuilding vulnerable testing environments I thought it was a nice idea to see if I could put them all in 1 docker container, so that a simple restart would refresh everything. I also wanted to see if I could break docker by putting so many things in 1 container. Turns out docker is really flexible and has no problem with running multiple webservers and databases at the same time. In 2017 I lost interest in the project as I was no longer using it and I didn't feel like maintaining all the dependencies anymore.
In 2022 @commjoen challenged me to revamp the project, so here we are :)## Disclaimer
This is a very bad idea and probably one of the best examples of how not to use docker.
![](assets/itruns.jpg)## Damn Vulnerable eXtensive Training Environment
DVXTE is a docker container with several vulnerable applications.
By using a docker container it's easy to setup and can easily be reset to it's starting point.Currently the container contains the following tools and applications:
**Vulnerable applications:**
* Juiceshop https://github.com/bkimminich/juice-shop
* Railsgoat https://github.com/OWASP/railsgoat
* django.NV https://github.com/nVisium/django.nV
* Buggy Bank https://www.mavensecurity.com/about/webmaven/**Exercise Environments**
* WebGoat https://github.com/WebGoat/WebGoat
* DVWA https://github.com/digininja/DVWA
* Mutilidae II https://github.com/webpwnized/mutillidae**Challenge labs**
* WrongSecrets https://github.com/commjoen/wrongsecrets
* CryptOMG https://github.com/SpiderLabs/CryptOMG
* FileUploadLab https://github.com/LunaM00n/File-Upload-Lab
* DVGQL https://github.com/dolevf/Damn-Vulnerable-GraphQL-Application**Tools**
* Mailcatcher https://mailcatcher.me/
* Supervisor http://supervisord.org/Once build, the image currently has a size of roughly 2.6 GB
## Dockerhub
Releases will be pushed to dockerhub; you can pull a compressesed and pre-build version at: https://hub.docker.com/r/dvsteinqx/dvxte### pulling the image
When you pull the image, make sure you add the version number, like e.g.:
`docker pull dvsteinqx/dvxte:0.2`### running the image
after pulling the image you can run it with the following command:
`docker run --name dvxte -p 80:80 -p 1080:1080 -p 3000:3000 -p 4000:4000 -p 5013:5013 -p 8000:8000 -p 8200:8200 -p 8300:8300 -p 8400:8400 -p 9000:9000 dvsteinqx/dvxte`