Running vulnerable web applications in Docker
In the previous recipe, we downloaded Docker and ran a hello-world example container. In this recipe, we will download a Docker container that we have prepared for you to download and use. It's an already configured and ready-to-use container that has three vulnerable web applications:
- OWASP bricks
- Damn vulnerable web applications
- WordPress 2.2 (Vulnerable!)
Getting ready
To step through this recipe, you will need Kali Linux running on Oracle Virtualbox or VMware and an Internet connection. This recipe is closely based on the previous recipe; it is highly recommended that you follow the previous recipe before moving on to this recipe. If you already have Docker installed on your Kali, you can directly start ...
Get Kali Linux Intrusion and Exploitation Cookbook now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.