You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
<ahref="https://github.com/aaaguirrep/pentest"><imgalt="GitHub code size in bytes"src="https://img.shields.io/github/languages/code-size/aaaguirrep/pentest"></a>
<ahref="https://github.com/aaaguirrep/offensive-docker"><imgalt="GitHub code size in bytes"src="https://img.shields.io/github/languages/code-size/aaaguirrep/offensive-docker"></a>
<ahref="https://github.com/aaaguirrep/offensive-docker"><imgalt="GitHub last commit"src="https://img.shields.io/github/last-commit/aaaguirrep/offensive-docker"></a>
<ahref="https://hub.docker.com/r/aaaguirrep/pentest"><imgalt="Docker Image Size (latest by date)"src="https://img.shields.io/docker/image-size/aaaguirrep/pentest"></a>
26
-
<ahref="https://hub.docker.com/r/aaaguirrep/pentest"><imgalt="Docker Image Version (latest by date)"src="https://img.shields.io/docker/v/aaaguirrep/pentest"></a>
<ahref="https://hub.docker.com/r/aaaguirrep/offensive-docker"><imgalt="Docker Image Size (latest by date)"src="https://img.shields.io/docker/image-size/aaaguirrep/offensive-docker"></a>
26
+
<ahref="https://hub.docker.com/r/aaaguirrep/offensive-docker"><imgalt="Docker Image Version (latest by date)"src="https://img.shields.io/docker/v/aaaguirrep/offensive-docker"></a>
Docker for pentest is an image with the more used tools to create an pentest environment easily and quickly.
33
+
Offensive Docker is an image with the more used tools to create an pentest environment easily and quickly.
34
34
35
-
:arrow_right:**Note:** Check out the next repo to know how to launch the docker for pentest in a VPS in Google Cloud Platform or Digital Ocean (free credit included). [VPS for docker for pentest](https://github.com/aaaguirrep/vps-docker-for-pentest)
35
+
:arrow_right:**Note:** Check out the next repo to know how to launch offensive docker in a VPS in Google Cloud Platform or Digital Ocean (free credit included). [Offensive Docker VPS](https://github.com/aaaguirrep/offensive-docker-vps)
36
36
37
37
### Table of Contents
38
38
@@ -43,7 +43,7 @@ Docker for pentest is an image with the more used tools to create an pentest env
43
43
-[Operative system tools](#operative-system-tools)
44
44
-[Network tools](#network-tools)
45
45
-[Developer tools](#developer-tools)
46
-
-[:hocho:Pentest tools](#hocho-pentest-tools)
46
+
-[:hocho:Offensive tools](#hocho-offensive-tools)
47
47
-[Port scanning](#port-scanning)
48
48
-[:mag: Recon](#mag-recon)
49
49
-[Subdomains](#subdomains)
@@ -94,8 +94,8 @@ Docker for pentest is an image with the more used tools to create an pentest env
2. Share information from your local directory to container directory and save information on your local directory. You should save information under /pentest directory.
373
+
2. Share information from your local directory to container directory and save information on your local directory. You should save information under /offensive directory.
374
374
375
-
docker run --rm -it -v /path/to/local/directory:/pentest --name my-pentest aaaguirrep/pentest /bin/zsh
375
+
docker run --rm -it -v /path/to/local/directory:/offensive --name my-offensive-docker aaaguirrep/offensive-docker /bin/zsh
376
376
377
377
3. Expose internal container services (apache, squid) for your local environment.
Inside the container start apache2 and squid services by the aliases.
382
382
@@ -385,7 +385,7 @@ There are differents use cases for use the image and you should know how to run
385
385
386
386
4. Mount directories by umount command.
387
387
388
-
docker run --rm -it --privileged --name my-pentest aaaguirrep/pentest /bin/zsh
388
+
docker run --rm -it --privileged --name my-offensive-docker aaaguirrep/offensive-docker /bin/zsh
389
389
390
390
5. Tools are downloaded in /tools directory.
391
391
@@ -395,48 +395,48 @@ You can set up the docker image with nice configurations like as:
395
395
396
396
### 1. Configure credentials in the docker
397
397
398
-
To use access keys, tokens or API Keys in the docker review the next repo [docker-pentest-config](https://github.com/aaaguirrep/docker-pentest-config)
398
+
To use access keys, tokens or API Keys in the docker review the next repo [Offensive Docker Custom](https://github.com/aaaguirrep/offensive-docker-custom)
399
399
400
400
### 2. Alias to connect to HTB (Hack the Box) VPN
401
401
402
-
To use both options you should use -v option to map local directoty with /pentest container directory.
402
+
To use both options you should use -v option to map local directoty with /offensive container directory.
403
403
404
404
#### Option 1 - HTB VPN using github repository
405
405
406
406
Add the next line in step "Create shorcuts" in Dockerfile, build a new image and run a new container with the -v option.
407
407
408
-
RUN echo "alias vpnhtb=\"openvpn /pentest/path/to/ovpn/file\"" >> /root/.zshrc
408
+
RUN echo "alias vpnhtb=\"openvpn /offensive/path/to/ovpn/file\"" >> /root/.zshrc
409
409
410
410
#### Option 2 - HTB VPN using docker hub image
411
411
412
412
Create a new Dockerfile with the next steps, build a new image and run a new container with -v option.
413
413
414
-
FROM aaaguirrep/pentest
414
+
FROM aaaguirrep/offensive-docker
415
415
416
416
# Create a shortcut and load the ovpn file from workstation
417
-
RUN echo "alias vpnhtb=\"openvpn /pentest/path/to/ovpn/file\"" >> /root/.zshrc
417
+
RUN echo "alias vpnhtb=\"openvpn /offensive/path/to/ovpn/file\"" >> /root/.zshrc
418
418
419
419
### 3. Save and load command history in your local environment
420
420
421
421
When you delete a container all information is deleted incluide command history. The next configuration provides you an option for save the command history in your local environment and load it when you run a new container. So, you wont lose your command history when run a new container.
422
422
423
-
To use both options you should use -v option to map local directoty with /pentest container directory.
423
+
To use both options you should use -v option to map local directoty with /offensive container directory.
424
424
425
425
#### Option 1 - Command history using github repository
426
426
427
427
Add the next line in step "Create shorcuts" in Dockerfile, build a new image and run a new container.
428
428
429
429
# Save and load command history in your local environment
430
-
RUN sed -i '1i export HISTFILE="/pentest/.zsh_history"' /root/.zshrc
430
+
RUN sed -i '1i export HISTFILE="/history/.zsh_history"' /root/.zshrc
431
431
432
432
#### Option 2 - Command history using docker hub image
433
433
434
434
Create a new Dockerfile with the next steps, build a new image and run a new container.
435
435
436
-
FROM aaaguirrep/pentest
436
+
FROM aaaguirrep/offensive-docker
437
437
438
438
# Save and load command history in your local environment
439
-
RUN sed -i '1i export HISTFILE="/pentest/.zsh_history"' /root/.zshrc
439
+
RUN sed -i '1i export HISTFILE="/history/.zsh_history"' /root/.zshrc
440
440
441
441
## :white_check_mark: Environment tested
442
442
@@ -452,9 +452,9 @@ The image was tested in the following environments:
452
452
453
453
- Do not save information on container directories because it will be lost after delete the container, you should save information in your local environment using the parameter -v when you run the container. For instance:
454
454
455
-
docker run --rm -it -v /path/to/local/directory:/pentest --name my-pentest aaaguirrep/pentest /bin/zsh
455
+
docker run --rm -it -v /path/to/local/directory:/offensive --name my-offensive-docker aaaguirrep/offensive-docker /bin/zsh
456
456
457
-
The above command specify a path local directory mapped with /pentest container directory. You should save all information under /pentest directory.
457
+
The above command specify a path local directory mapped with /offensive container directory. You should save all information under /offensive directory.
458
458
459
459
- Use hashcat and john the ripper on controlled environments as CTF. You can experiment issues.
460
460
@@ -468,15 +468,15 @@ While I drink the coffee I check more tools to add in the docker image.
468
468
469
469
## Contributors
470
470
471
-
Thank you to all our [contributors](https://github.com/aaaguirrep/pentest/graphs/contributors)!
471
+
Thank you to all our [contributors](https://github.com/aaaguirrep/offensive-docker/graphs/contributors)!
472
472
473
473
## Contributing
474
474
475
475
[Contributing Guide](CONTRIBUTING.md)
476
476
477
477
## :chart_with_upwards_trend: Stargazers over time
478
478
479
-
[](https://starchart.cc/aaaguirrep/pentest)
479
+
[](https://starchart.cc/aaaguirrep/offensive-docker)
0 commit comments