Terraform script to deploy below vulnerable container targets on AWS.
Juice-shop:
https://hub.docker.com/r/bkimminich/juice-shop
DVWA:
https://hub.docker.com/r/vulnerables/web-dvwa
XVWA:
https://hub.docker.com/r/bitnetsecdave/xvwa
Pentest in Docker:
https://github.com/Swordfish-Security/Pentest-In-Docker
Vulnerable Graphql:
https://github.com/dolevf/Damn-Vulnerable-GraphQL-Application
Vulnerable API:
https://github.com/erev0s/VAmPI
Vulnerable SMB:
https://github.com/dperson/samba
Create your AWS keys:
https://www.youtube.com/watch?v=HuE-QhrmE1c
access_key = "ADD YOUR KEY HERE"
secret_key = "ADD YOUR KEY HERE"
ssh-keygen -q -t rsa -N '' -f ~/.ssh/vulnlab <<<y >/dev/null 2>&1
git clone https://github.com/DarkRelayLabs/vulnlab_aws.git && cd vulnlab_aws
terraform init
terraform apply --auto-approve
On your browser navigate to http://<EC2_Public_IP> to start the tests.
terraform destroy --auto-approve
Configures one EC2 micro instance to host containers.
Configures one security group.
Configures ingress rules for ports 80,81,83,84,85, 139 and 445 to allow traffic from your IP only.
Compromise DVWA to access Port 8082 and reach XVWA (this is for pivoting scenarios).
Configures ingress rules for port 22 to allow traffic from any IP.
Configures egress rule for all traffic outbound connections.
Happy hunting!!