Commit 49b2e6e9 authored by Kilian Low's avatar Kilian Low
Browse files

Update README.md

parent 01fe50ee
# SSI_CVE_2018_8979 # SSI_CVE_2018_8979
Devoir 2 SSI ## Build image
\ No newline at end of file ```bash
docker build . -t openaudit
```
### Launch image in first terminal and exposing your local port 3000 to its port 80
```bash
docker run -t -i -v "$(pwd)":/source -p 3000:80 openaudit
```
## Step to reproduce the exploit
### Open a second terminal and enter the same docker session
```bash
docker exec -it "$(docker ps -q -n 1)" bash
```
### Inside the second terminal, reset mysql_server password
```bash
cat reset.sql | mysql -uroot
### Download the executable
```bash
wget http://dl-openaudit.opmantek.com/OAE-Linux-x86_64-release_2.1.run
### Install the .run
```bash
chmod +x OAE-Linux-x86_64-release_2.1.run && yes Y | ./OAE-Linux-x86_64-release_2.1.run
## Installation is finished, you can now access the interface on your machine at
[localhost:3000](http://localhost:3000)
Markdown is supported
0% or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment