The usage of Docker is a very good idea, users and testers do not have to install a single package, just to start our container. No more bugs for edge cases software versions ( like the rm tool that do not accept the -rf option 😓 ).
But I wonder if it still allow us to do our jobs right: can we put devices in monitor mode, sniff wifi packets, perform ARP poisoning... ??
From a quick search I found that by using pipework --direct-phys eth1 $CONTAINERID 192.168.1.2/24 we can assign a physical network interface to our container, but I'm in doubt about this approach as it can create troubles to other programs that uses that interface.
@developpsoft can you play a little with Docker ? finding out if aircrack, nmap, arppoison and all our loved tools works fine ?
Thank you in advance for your contributions, I'll assign this issue to a note on the cSploit core project.
The usage of Docker is a very good idea, users and testers do not have to install a single package, just to start our container. No more bugs for edge cases software versions ( like the
rmtool that do not accept the-rfoption 😓 ).But I wonder if it still allow us to do our jobs right: can we put devices in monitor mode, sniff wifi packets, perform ARP poisoning... ??
From a quick search I found that by using
pipework --direct-phys eth1 $CONTAINERID 192.168.1.2/24we can assign a physical network interface to our container, but I'm in doubt about this approach as it can create troubles to other programs that uses that interface.@developpsoft can you play a little with Docker ? finding out if
aircrack,nmap,arppoisonand all our loved tools works fine ?Thank you in advance for your contributions, I'll assign this issue to a note on the cSploit core project.