CTFDocker/README.md

25 lines
671 B
Markdown
Raw Normal View History

2022-05-06 13:38:50 +02:00
# 42CTF Dockerfile !
Here is a docker image to use to solve most of the CTF on the platform! If you are at 42 and you don't have root rights, you can use this image to use the missing tools!
## Tools included
```
- file
- radare2
2022-05-06 14:46:28 +02:00
- binwalk
2022-05-06 13:38:50 +02:00
- gdb
- gdb-peda
- gdb-gef
- gdb-pwn
- exiftool
```
## Usage
2022-05-06 14:00:17 +02:00
```
docker run --security-opt seccomp=unconfined --rm -v `pwd`:/42ctf -it atrouill/42ctf /bin/ash
```
2022-05-06 13:38:50 +02:00
For more simplicity you can do :
2022-05-06 14:00:17 +02:00
```bash
2022-05-06 14:20:27 +02:00
echo "alias 42ctf='docker run --security-opt seccomp=unconfined --rm -v \`pwd\`:/42ctf -it atrouill/42ctf /bin/ash'" >> ~/.zshrc && source ~/.zshrc
2022-05-06 14:00:17 +02:00
```
2022-05-06 13:45:56 +02:00
Then you just have to run `42ctf` in the folder where your binaries are!