Skip to content

Stuub/DoomBox

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

37 Commits
 
 
 
 
 
 

Repository files navigation

DoomBox

An automated insecure web server, initially developed for a packet sniffing and traffic analysis demo in my Cyber Clinic workshops. Now evolved into an OWASP inspired CTF! Available for both your localhost and docker instances!

"TLDR, Let me play":

└─$ docker run -p 80:80 -d docker.io/stuub/doomed:latest

Full CTF build of DoomBox is available on the Docker Instance *ONLY*


Common vulnerabiltiies added for web server. Currently supporting:

What to expect of the Full CTF:

  • Multi-Level Privilege Escalation
  • Privilege Escalation via Cron Job Vulnerability
  • Exploiting Set User ID (SUID) Permissions


3 Flags to capture! One at each level of privilege

Lite vs Docker

Lite:

  • Simplicity in mind
  • Purely Python based
  • Web Server hosted on users local file system
  • HTTP & PHP Servers - Ports 8000 (HTTP) & 8001 (PHP)

Docker:

  • Full CTF: Web to Root
  • Initialised through a Python script for ease of access!
  • Hugely greater scalability for vulnerabilities
  • Dedicated Apache Web Server (Reverse Shells are reliable & accurate)

git clone https://github.com/Stuub/DoomBox

Spin up in seconds!

image

Login Portal

image

XSS

image

RCE

whatTheShell

Privilege Escalation!

image