Skip to content

jselvi/docker-crime

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

5 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

This Docker image is based on the yamamuteki/debian-etch-i386 Debian Etch docker image.

The main purpose of this docker image is to create a vulnerable environment to exploit CRIME. To run this image after installing Docker, use a command like this:

$ sudo docker run --rm -p 443:443 jselvi/crime

Now you can test if we are facing a vulnerable web server by using a tool such as testssl.sh:

$ testssl.sh --crime https://127.0.0.1

 Testing for CRIME vulnerability

  1 Listen 443
 CRIME, TLS (CVE-2012-4929)                VULNERABLE (NOT ok)

The legitimate user should visit https://127.0.0.1/setcookie.html. This page will create a new cookie for the user. Now if you visits https://127.0.0.1 you will find a message "ACCESS GRANTED".

An attacker should be able to exploit CRIME and obtain the cookie value. For this example, this cookie is static and never changes. It doesn't really matter to exploit the issue, and it was much easier to implement.

About

Docker image to exploit CRIME vulnerability

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages