宿主机
docker run -ti --name=awvs -v /tmp/awvs:/tmp/awvs ubuntu
将 acunetix_trial.sh 和 patch_awvs 放到宿主机 /tmp/awvs 目录下
进入容器内
apt-get install sudo libxdamage1 libgtk-3-0 libasound2 libnss3 libxss1 libx11-xcb-dev -y
| OSCP Prep class | |
| Day 1: Exploit Research | |
| http://www.securitytube.net/groups?operation=view&groupId=7 | |
| Day 2: Python Hacking | |
| https://www.youtube.com/playlist?list=PLEA1FEF17E1E5C0DA (videos 1-10 if you are a complete beginner) | |
| https://www.youtube.com/playlist?list=PL1A2CSdiySGLtKwqBnqj9BON6QQjWkP4n (entire playlist) | |
| #! /usr/bin/env python3 | |
| ''' | |
| Needs Requests (pip3 install requests) | |
| Author: Marcello Salvati, Twitter: @byt3bl33d3r | |
| License: DWTFUWANTWTL (Do What Ever the Fuck You Want With This License) | |
| This should allow you to detect if something is potentially exploitable to the log4j 0day dropped on December 9th 2021. | 
宿主机
docker run -ti --name=awvs -v /tmp/awvs:/tmp/awvs ubuntu
将 acunetix_trial.sh 和 patch_awvs 放到宿主机 /tmp/awvs 目录下
进入容器内
apt-get install sudo libxdamage1 libgtk-3-0 libasound2 libnss3 libxss1 libx11-xcb-dev -y