Skip to main content

A Docker runner for docker-based vulnerable environments.

Project description


Docker Vuln Runner

Docker Vuln Runner
A Docker runner for docker-based vulnerable environments.

Table of Contents

Overview

vuln-runner is a tool that allows you to quickly run the docker vulnerable stacks.

The vulnerable stack actually supported are:

At SecSI we found it useful to reproduce vulnerable environments for training purposes. To reproduce vulnerable environment easily, take a look at DSP.

Install

You can easily install it by running:

pip install vuln-runner

This will install three basic command:

  • vuln-runner: the basic module to run vuln-runner in local-mode;
  • vuln-controller: the controller module that manages a set of vuln-nodes ;
  • vuln-node : a vulnerable node that can receive commands from a vuln-controller.

Local Usage

It is possible to use vuln-env in local-mode. The docker environment is installed locally and it all the vulnerable stacks runs locally.

vuln-runner --help

This will display help for the tool. Here are all the switches it supports.

Usage: vuln-runner [OPTIONS] COMMAND [ARGS]...

Options:
  --help  Show this message and exit.

Commands:
  down              Down a list of vulnerable projects
  down-env          Down an environment
  generate-vulnenv  Generate <no_env> vulnerable environments composed of...
  init
  list              List the vulnerable names
  run               Run a list of vulnerable projects
  run-env           Run an environment taken from a JSON configuration file
  update            Update the vulnerable git repositories

  • Initialized the vulnerable environment:
vuln-runner init

asciicast

  • List the vulnerable stacks:
vuln-runner list

asciicast

  • Run a list of vulnerable stacks:
vuln-runner run vulhub.CVE-2014-3120,vulhub.CVE-2018-1270

asciicast

  • Down the list of vulnerable stacks:
vuln-runner down vulhub.CVE-2014-3120,vulhub.CVE-2018-1270

asciicast

Advanced usage: vulnerable environment

With the previous commands you can already manage your vulnerable stacks and manually run and stop them. Anyway, you can also create vulnerable environments. A vulnerable environment is a set of vulnerable docker-compose stacks that has not ports' conflicts.
You can generate a vulnerable environment descriptor in JSON format with the generate-vulnenv command:

vuln-runner generate-vulnenv NO_VULNS [--no-env=<default=1>]
  • NO_VULNS defines the number of vulnerable stacks for each environment.
  • --no-env defines the number of environments. It is useful if you want to run vuln-runner in different hosts, where each host runs a single environment.

For example, to create a JSON vulnerable descriptor with two vulnerable stack and two environments:

vuln-runner generate-vulnenv 2 --no-env=2  

asciicast

You can output into the JSON descriptor into a file an reuse with two commands:

  • run-env: run the set of stacks belonging to a vulnerable environment.
vuln-runner run-env output.json 1

asciicast

  • down-env: down the vulnerable environment.
vuln-runner down-env output.json 1

asciicast

Distributed Usage

It is possible to use vuln-runner in distributed-mode:

  1. vuln-nodes initialize a token and run a tcp server that listens for commands
  2. A vuln-controller initializes the same token and can manage the vulnerable environments
    The example architecture is shown in the following Figure:
    image

node configuration

  1. Initializes the node:
vuln-runner init 
vuln-node init 

You have to define a token that will be used to validate the requests that comes from a controller.

  1. Start the vulnerable node:
vuln-node start  

From this moment the vuln-node listens for connections on port 4545 .
When a vuln-node is listening for a connection the controlle is able to find it through the discovery step.

controller configuration

  1. Initialize the controller
vuln-runner init 
vuln-controller init 
  1. Discover the remote nodes
vuln-controller discovery <subnet_vulnerable_nodes> -u  

Through this command the controller finds all the hosts presents in the network. When the -u option is used, the hosts.json configuration file present in the ~/.vulnenv folder is updated with the list of the vuln-nodes.

  1. Generate the vulnerable environments
    After the configuration the hosts.json it is possible to generate a vulnerable environment configuration composed of <no_env> vulnerable scenarios. For example, the following command:
vuln-controller generate-vulnenv 2  

generates two vulnerable environment for each vuln-node discovered previosly.

  1. Manage the enviornments
    To run a single vulnerable environment:
vuln-controller run-env <ip>  

It is also possible to run all the vulnerable environments:

vuln-controller run-envs   

To shutdown the environments:

vuln-controller down-envs  

Design considerations for the distributed architecture

The token is used to authenticate the requests that comes from the controller. It is not used as secure mechanism. All the protocol is unencrypted, as we suppose that the environment is "unsecure-by-default". It is used to setup vulnerable machines. An attacker could potentially intercepts the requests and put them down.

You could setup firewall rules to allow the connections to the 4545 only from the controller IP host.

This is useful as the students should not be able to see that port.

Development

The poetry packaging and management tool was used to build the project.
To initialize the project:

poetry install 

To run the several commands, you can use poetry as follows:

poetry run vuln-runner <command>  

Credits

Developed by gx1 @SecSI

License

Docker Vuln Runner is released under the GPL LICENSE

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

vuln_runner-0.1.5.tar.gz (23.9 kB view details)

Uploaded Source

Built Distribution

vuln_runner-0.1.5-py3-none-any.whl (26.5 kB view details)

Uploaded Python 3

File details

Details for the file vuln_runner-0.1.5.tar.gz.

File metadata

  • Download URL: vuln_runner-0.1.5.tar.gz
  • Upload date:
  • Size: 23.9 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/4.0.1 CPython/3.10.8

File hashes

Hashes for vuln_runner-0.1.5.tar.gz
Algorithm Hash digest
SHA256 36bff4c899ec2bf8704f027942fff633ddad15f8c7d82b1363246e3ba45b7f9d
MD5 9e0abed188e88245deb043180b741698
BLAKE2b-256 842f2b3c571ea94c93e557243a72709c5cb1288c0fa8ff2636e45d3c9c13f2ce

See more details on using hashes here.

Provenance

File details

Details for the file vuln_runner-0.1.5-py3-none-any.whl.

File metadata

  • Download URL: vuln_runner-0.1.5-py3-none-any.whl
  • Upload date:
  • Size: 26.5 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/4.0.1 CPython/3.10.8

File hashes

Hashes for vuln_runner-0.1.5-py3-none-any.whl
Algorithm Hash digest
SHA256 f659fb765a336ffd3650dfdc8309378c3e739f7b26613b551f48dc0940112089
MD5 18b9028d9fcd86791fc33f0585646dfd
BLAKE2b-256 f7a4b0cce304865a97550cf4b3b0dbf147b8aac8724b877ffeb4ee93ea2092f5

See more details on using hashes here.

Provenance

Supported by

AWS AWS Cloud computing and Security Sponsor Datadog Datadog Monitoring Fastly Fastly CDN Google Google Download Analytics Microsoft Microsoft PSF Sponsor Pingdom Pingdom Monitoring Sentry Sentry Error logging StatusPage StatusPage Status page