mirror of
https://github.com/telekom-security/tpotce.git
synced 2025-05-03 13:48:54 +00:00

updating .env, env.example and compose files regarding sentrypeer ENVs make glutton image aware of payloads feature bump glutton to latest master, alpine 3.19, multi-stage build bump ipphoney to alpine 3.19 bump mailoney to alpine 3.19, adjust for py3 revert medpot to previous master, use multi stage build and alpine 3.19 bump cyberchef to latest master bump ngninx to alpine 3.19 bump p0f to alpine 3.19, use multi stage build bump redishoneypot to alpine 3.19, use multi stage build bump sentrypeer to latest master, fix bug for open ports in compose files, now all tcp/5060, udp/5060 traffic will be seen bump spiderfoot to latest master bump spiderfoot to alpine 3.19 bump suricata to 7.0.2, fix performance issue with capture-filter-bpf by reducing the rules update clean.sh to include glutton payloads folder
39 lines
1.1 KiB
Docker
39 lines
1.1 KiB
Docker
FROM alpine:edge
|
|
#
|
|
# Include dist
|
|
COPY dist/ /root/dist/
|
|
#
|
|
# Install packages
|
|
RUN apk -U --no-cache add \
|
|
ca-certificates \
|
|
curl \
|
|
file \
|
|
hiredis \
|
|
libcap \
|
|
wget \
|
|
suricata && \
|
|
#
|
|
# Setup user, groups and configs
|
|
addgroup -g 2000 suri && \
|
|
adduser -S -H -u 2000 -D -g 2000 suri && \
|
|
cp /root/dist/*.yaml /etc/suricata/ && \
|
|
cp /root/dist/*.conf /etc/suricata/ && \
|
|
cp /root/dist/*.bpf /etc/suricata/ && \
|
|
cp /root/dist/update.sh /usr/bin/ && \
|
|
chmod 644 /etc/suricata/*.config && \
|
|
chmod 755 -R /var/lib/suricata && \
|
|
chmod 755 /usr/bin/update.sh && \
|
|
chown -R root:suri /tmp /run && \
|
|
#
|
|
# Download the latest EmergingThreats OPEN ruleset
|
|
suricata-update update-sources && \
|
|
suricata-update --no-test --no-reload && \
|
|
#
|
|
# Clean up
|
|
rm -rf /root/* && \
|
|
rm -rf /tmp/* && \
|
|
rm -rf /var/cache/apk/*
|
|
#
|
|
# Start suricata
|
|
STOPSIGNAL SIGINT
|
|
CMD SURICATA_CAPTURE_FILTER=$(update.sh $OINKCODE) && exec suricata -v -F $SURICATA_CAPTURE_FILTER -i $(/sbin/ip address show | /usr/bin/awk '/inet.*brd/{ print $NF; exit }')
|