The Dockerfile
runs the vulnerable vsftpd 2.3.4 server and docker-compose.yml
orchestrates running multiple instances of that server for 12 teams (as an example) that can be used in cybersecurity classes for students to practice pentesting.
Students' goal is to read about this backdoor, exploit it, and see what is inside of the x_secret_is_here.txt
file when they successfully exploit it. Here is how they do it:
ftp IP 20XX
telnet IP 62XX
ls
; to see the list of the files. To print something on the screen, you can type:
cat file_name;