hacking & security/web2 LINE CTF - 2021 ( diveInternal, your-note ) challenge code: https://github.com/zbvs/ctf/tree/master/linectf-2020 - diveInternal - docker-compose.yml version: "2" services: nginx: build: context: ./nginx/ container_name: linectf_diveinternal_nginx restart: always image: linectf_diveinternal_nginx ports: - "12004:80" networks: - ctf-network public: build: context: ./public/ target: production container_name: linectf_diveinternal_public rest.. 2021. 3. 23. pbctf 2020 - sploosh writeup 문제에 제공된 docker-compose 파일을 확인해보니 splash 와 php 서버로 이루어진 시스템이였다. version: "3.8" services: webapp: build: . env_file: - ./flag.env networks: sploosh_internal: ipv4_address: 172.16.0.14 ports: - 9000:80 volumes: - ./src:/var/www/html/:ro splash: image: scrapinghub/splash ports: - 8050:8050 networks: sploosh_internal: ipv4_address: 172.16.0.13 networks: sploosh_internal: ipam: driver: default config:.. 2020. 12. 17. 이전 1 다음