Skip to content

Commit be656b2

Browse files
authored
Merge pull request CSPF-Founder#3 from m4n3dw0lf/master
Adding Docker option
2 parents 89a9159 + d87637c commit be656b2

File tree

5 files changed

+41
-7
lines changed

5 files changed

+41
-7
lines changed

Dockerfile

+9
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,9 @@
1+
FROM tomcat
2+
3+
COPY . .
4+
5+
RUN apt-get update ; apt-get install maven default-jdk -y ; update-alternatives --config javac
6+
7+
RUN mvn clean package ; cp target/*.war /usr/local/tomcat/webapps/
8+
9+
CMD ["catalina.sh","run"]

README.md

+18-4
Original file line numberDiff line numberDiff line change
@@ -11,8 +11,22 @@ https://www.udemy.com/hacking-securing-java-web-programming/
1111
How to Use/Setup ?
1212
-------------
1313

14-
**Method 1.Very Easiest Method : VirtualBox VM**
15-
The Most easiest way to use Java Vulnerable is using the VirtualBox VM which has everything set up and ready to use.
14+
**Method 1.Super Very Easiest Method: Docker**
15+
The easiest way to use Java Vulnerable is using Docker which set up everything for you with 1 command line
16+
17+
Steps:
18+
19+
1. Install Docker: https://docs.docker.com/engine/installation/
20+
2. Install docker-compose: https://docs.docker.com/compose/install/
21+
3. Inside this directory, run `sudo docker-compose up` and wait untill everything is configured for you.
22+
4. In your Browser, go to "http://localhost:8080/JavaVulnerableLab/install.jsp
23+
5. Change the JDBC URL from jdbc:mysql://localhost:3306 to jdbc:mysql://mysql:3306
24+
6. Click the Install Button
25+
7. Enjoy :)
26+
27+
28+
**Method 2.Very Easiest Method : VirtualBox VM**
29+
The second most easiest way to use Java Vulnerable is using the VirtualBox VM which has everything set up and ready to use.
1630

1731
Steps:
1832

@@ -28,7 +42,7 @@ How to Use/Setup ?
2842
10. Click the Install Button
2943
11. Enjoy :)
3044

31-
**Method 2.Easiest Method : Standalone Web Application**
45+
**Method 3.Easiest Method : Standalone Web Application**
3246
In this mehtod, you will be running an executable "JAR" file which runs the application with an embedded Apache Tomcat.
3347

3448
Steps:
@@ -39,7 +53,7 @@ How to Use/Setup ?
3953
4. In your Browser, go to "http://localhost:8080/JavaVulnerableLab/install.jsp
4054
5. Click the Install Button
4155
42-
**Method 3. Using War file:**
56+
**Method 4. Using War file:**
4357
This is a NORMAL method to deploy the WAR file.
4458

4559
Steps:

docker-compose.yml

+11
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,11 @@
1+
javavulnlab:
2+
build: .
3+
ports:
4+
- 8080:8080
5+
links:
6+
- mysql
7+
8+
mysql:
9+
image: mysql
10+
environment:
11+
- MYSQL_ROOT_PASSWORD=root

src/main/webapp/WEB-INF/config.properties

+2-2
Original file line numberDiff line numberDiff line change
@@ -5,6 +5,6 @@
55
dbuser=root
66
dbpass=root
77
dbname=abc
8-
dburl=jdbc:mysql://localhost:3306/
8+
dburl=jdbc:mysql://mysql:3306/
99
jdbcdriver=com.mysql.jdbc.Driver
10-
siteTitle=Java Vulnerable Lab
10+
siteTitle=Java Vulnerable Lab

src/main/webapp/install.jsp

+1-1
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@
1010
<tr><td>Database User:</td> <td><input type="text" name="dbuser" value="root"/></td></tr>
1111
<tr><td>Database Password:</td> <td><input type="text" name="dbpass" value="root"/></td></tr>
1212
<tr><td>JDBC Driver:</td> <td><input type="text" name="jdbcdriver" value="com.mysql.jdbc.Driver"/></td></tr>
13-
<tr><td>JDBC URL:</td> <td><input type="text" name="dburl" value="jdbc:mysql://localhost:3306/"/></td></tr>
13+
<tr><td>JDBC URL:</td> <td><input type="text" name="dburl" value="jdbc:mysql://mysql:3306/"/></td></tr>
1414
<tr><td>Admin Login Credential:</td></tr>
1515
<tr><td>Username(Default):</td> <td><input type="text" name="adminuser" value="admin"/></td></tr>
1616
<tr><td>Password(Default):</td> <td><input type="text" name="adminpass" value="admin"/></td></tr>

0 commit comments

Comments
 (0)