Skip to content

Commit

Permalink
Added docker file and instructions
Browse files Browse the repository at this point in the history
  • Loading branch information
RickdeJager committed Apr 13, 2020
1 parent d7ff93b commit 8598e36
Show file tree
Hide file tree
Showing 2 changed files with 16 additions and 0 deletions.
10 changes: 10 additions & 0 deletions Dockerfile
Original file line number Diff line number Diff line change
@@ -0,0 +1,10 @@
FROM ubuntu:18.04

RUN apt-get update && apt-get -y install binutils-arm-linux-gnueabihf python3 python3-pip nmap

COPY click2pwn /click2pwn

RUN pip3 install -r /click2pwn/requirements.txt

CMD python3 /click2pwn/main.py

6 changes: 6 additions & 0 deletions README.md
Original file line number Diff line number Diff line change
Expand Up @@ -9,6 +9,8 @@ Our tool can be used to gain a root shell on a number of different IP Cameras. T
## Installing

The exploit was developed on linux, and will require some minor changes to work on Windows. Our installation instructions assume you are running a fresh install of Ubuntu 18.

We also provide a `Dockerfile`. Keep in mind that your docker host needs to support [the "host" networking driver](https://docs.docker.com/network/network-tutorial-host/#prerequisites) which is, at time of writing, only available on linux. Skip to [Docker](#Docker) for instructions.


You need the following tools to run this exploit:
Expand Down Expand Up @@ -40,6 +42,10 @@ python main.py [target ip]
```
Typing `help` will show a full list of supported commands. The most interesting one being `shell`, which opens a reverse shell on the target host.

# Docker
Every modern repository comes with a Dockerfile, and we did not want to fall behind. To run our tool using docker:
1. `docker build . -t dagro-hacks`
1. `docker run --network=host -it dagro-hacks`

# Acknowledgments

Expand Down

0 comments on commit 8598e36

Please sign in to comment.