pwn_docker_example icon indicating copy to clipboard operation
pwn_docker_example copied to clipboard

Example pwnable challenge hosted with docker

pwn_docker_example

Example pwnable CTF challenge hosted with docker. We used this code to run a challenge in a server setup with docker, and then use a docker container as a CTF OS to write and run the exploit.

Related Binary Exploitation Resources:

There is also a whole playlist using challenges from https://exploit.education. Later episodes explore some 64bit challenges and goes over various pitfalls:

More Docker Videos