Since I blogged a bit about docker security tools, I thought of continuing the trend and introduce Pwnbox, is an open source docker container that has tools to aid you in reverse engineering and exploitation. It allows you to package up an container with all of the tools of trade you need in a capture-the-flag situation, or elsewhere too!
What is Pwnbox?
We know that, Docker is an open-source project that automates the deployment of applications inside software containers, so that developers and sysadmins can build, ship, and run distributed applications in a short amount of time. Consider you are in a CTF and want a preset number of tools for this particular task and you have forgotten your faithful USB drive containing all your favourite tools elsewhere. What do you do? With pwnbox, you can simply spin up a container with your favourite tools and be one your way to glory!
Tools pwnbox installs:
Via python-pip, pwnbox installs the following:
It then goes on to install tools like capstone, radare2, ropper, ropme, rp++, retargetable decompiler scripts, villoc, libformatstr, preeny, xortool, tmux-resurrect, libc-database, peda, gef and lastly pwndbg. If you have certain customizations (such as .radare2rc, .bashrc, .vimrc, etc.), they can be stored in the ./rc directory. Ofcourse, you can customize such a list per CTF basis.
The container is designed to be isolated so no directories are mounted from the host. This allows you to have multiple containers hosting files from different CTFs – this is both good and bad, depending on the tools and the environment you need.
More information about getting pwnbox can be found here.