forked from CrowdStrike/vulnapp
-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathentrypoint.sh
executable file
·22 lines (18 loc) · 956 Bytes
/
entrypoint.sh
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
#!/bin/sh
set -e -o pipefail
cd /home/eval
# Mark as CS testcontainer
sh -c echo CS_testcontainer starting
exec /shell2http -show-errors -include-stderr \
/ps "ps aux" \
/rootkit ./bin/Defense_Evasion_via_Rootkit.sh \
/masquerading ./bin/Defense_Evasion_via_Masquerading.sh \
/data_exfiltration ./bin/Exfiltration_via_Exfiltration_Over_Alternative_Protocol.sh \
/reverse_shell_trojan './bin/Reverse_Shell_Trojan.sh' \
/deploy_malware './bin/evil/Linux_Malware_High' \
/reverse_shell ./bin/Command_Control_via_Remote_Access.sh \
/reverse_shell-obfuscated ./bin/Command_Control_via_Remote_Access-obfuscated.sh \
/credentials_dumping ./bin/Credential_Access_via_Credential_Dumping.sh \
/credentials_dumping_collection ./bin/Collection_via_Automated_Collection.sh \
/suspicious_commands ./bin/Execution_via_Command-Line_Interface.sh \
/container_drift ./bin/ContainerDrift_Via_File_Creation_and_Execution.sh