Running vulnerable web applications in Docker
In the recipe, we downloaded and ran a hello-world example container. In this recipe, we will download a Docker container that we have prepared for you to download and use. It's an already configured and ready-to-use container that has three vulnerable web applications:
- OWASP bricks
- Damn vulnerable web applications
- WordPress 2.2 (Vulnerable!)
Getting ready
To step through this recipe, you will need Kali Linux running on Oracle Virtualbox or VMware and an Internet connection. This recipe is closely based on the previous recipe; it is highly recommended that you follow the previous recipe before moving on to this recipe. If you already have Docker installed on your Kali, you can directly start with this recipe.
How to do it...
For this recipe, you need to perform the following steps:
- Open the terminal and pull the Docker container image, as shown in the following command:
$ docker pull intrusionexploitation/dvwa-wordpress2.2-bricks
- You will see the...