From 49b2e6e9d237c1dee9102a9dab05ea881de7f87d Mon Sep 17 00:00:00 2001 From: Kilian Low Date: Sun, 13 Jan 2019 23:39:08 +0100 Subject: [PATCH] Update README.md --- README.md | 31 ++++++++++++++++++++++++++++++- 1 file changed, 30 insertions(+), 1 deletion(-) diff --git a/README.md b/README.md index 39354ce..4301286 100644 --- a/README.md +++ b/README.md @@ -1,3 +1,32 @@ # SSI_CVE_2018_8979 -Devoir 2 SSI \ No newline at end of file +## Build image +```bash +docker build . -t openaudit +``` + +### Launch image in first terminal and exposing your local port 3000 to its port 80 +```bash +docker run -t -i -v "$(pwd)":/source -p 3000:80 openaudit +``` + +## Step to reproduce the exploit +### Open a second terminal and enter the same docker session +```bash +docker exec -it "$(docker ps -q -n 1)" bash +``` +### Inside the second terminal, reset mysql_server password +```bash +cat reset.sql | mysql -uroot + +### Download the executable +```bash +wget http://dl-openaudit.opmantek.com/OAE-Linux-x86_64-release_2.1.run + +### Install the .run +```bash +chmod +x OAE-Linux-x86_64-release_2.1.run && yes Y | ./OAE-Linux-x86_64-release_2.1.run + +## Installation is finished, you can now access the interface on your machine at +[localhost:3000](http://localhost:3000) + -- GitLab