A Docker-based template repository designed to deploy customizable pwnable CTF challenges using xinetd.
A docker repository for deploying pwnable challenges in CTF
This tool is primarily used by CTF organizers and security professionals to quickly deploy and manage pwnable challenges in a controlled Docker environment. It simplifies challenge setup by allowing users to customize binaries, flags, and network exposure, making it ideal for penetration testing and red teaming exercises.
Avoid naming your challenge 'bin' as it conflicts with the folder name; ensure to update the flag file when adding new challenges; capturing traffic requires tcpdump installed on the host machine.
Place challenge files into the 'bin' folder, updating the flag accordingly
Edit 'ctf.xinetd' to replace the default command with your challenge executable
Optionally customize 'Dockerfile', 'ctf.xinetd', and 'start.sh' to tailor the environment
Build the Docker image with: docker build -t "helloworld" .
docker build -t "helloworld" .
Builds the Docker image for the challenge environment.
docker run -d -p "0.0.0.0:pub_port:9999" -h "helloworld" --name="helloworld" helloworld
Runs the challenge container, exposing the specified port to the public network.
tcpdump -w helloworld.pcap -i eth0 port pub_port
Captures network traffic on the host for the challenge port.