rDod can be launch as it but you might want to customize. To do so, a few environment variables are available such as :
If you are using docker-compose you can also edit the docker-compose file to customize rDod
rDod cab be launch by 2 different ways :
Docker-Compose is the easiest way to launch rDoD. By using it the Home of the rDod user will be persistent.
You can use Docker-Compose to download and launch rDoD by using the following command:
docker-compose up
It's also possible to launch rDoD in "detach" mode by adding the -d parameter:
docker-compose up -d
You can launch rDoD by using the classical Docker CLI. That way permit a better customization but will require to write a longer command line.
docker run -p 5901:5901 -p 5911:5911 mderasse/rdod:latest
Of course you can replace latest by another image tag.
You might also want to have a persistent Home. You can do this by using the parameter -v like :
docker run -p 5901:5901 -p 5911:5911 -v $(pwd)/home:/home/user mderasse/rdod:latest
You might also want to use those parameter :
rDoD currently provide 2 different ways of access.
In order to acces to rDoD by using VNC you will have to install the TigerVNC viewer.
You can find the different binary depending of your OS on that link: TigerVNC Viewer
After the installation done you will have to launch the client and connect to :
YOUR_IP:5901
noVNC is a HTML5 Client. You can access it directly by using your favorite Web Browser
http://YOUR_IP:5911
Don't forget to change HTTP to HTTPS is USE_SSL is enabled.
rDoD is made in a way that it's really easy to extend it.
Do to so you will have to create a Dockerfile like the following one:
FROM mderasse/rdod:latest
LABEL maintainer="Matthieu DERASSE <github@derasse.fr>"
# Back to Root
USER 0
# Configure Custom System
COPY ....
RUN ....
# Back to User
USER 1000
Please, take a look at the customs directory, that can be a good source of inspiration. Feel free to share your version by creating a pull Request!
1) noVNC does not handle well all the keyboard key
Extending and consolidating hosts files from several well-curated sources like adaway.org, mvps.org, malwaredomainlist.com, someonewhocares.org, and potentially others. You can optionally invoke e...
** Qu'on ne me dise pas que la génération Y et Z maîtrise le numérique. Cela fait des années que je prétends le contraire en disant que les jeunes ne sont que des simples consommateurs et qu'ils baignent dans l'illectronisme face à un PC.
En voici une preuve supplémentaire avec cette article (descendez un peu, ça parle des "digital natives" - dit sur un ton ironique bien sûr...)
CNCF Cloud Native Interactive Landscape
As the population ages and shrinks, the country is making it easier for foreigners to work and become citizens.
How to correct this issue ? but with a problem for handicap person...
Just disable the sticky keys prompt from running when you press shift 5 times. Then when CMD is renamed to SETHC, it won't pop up. Solved.
Win7:
Start > type "change how your keyboard works"
Click the first option
Click set up sticky keys
Uncheck turn on sticky keys when shift is pressed 5 times.
You really don't need to have a Windows disc or image on a USB either to make the exploit work. I'm trying to say that disabling the PC from starting from a different drive than the internal system drive won't prevent the exploit from being performed. This workaround is done by resetting the computer when it's starting up and using a startup repair to get access to the file system to rename CMD to SETHC. Sure, it's hard on the disk drive, but if you're breaking into somebody else's machine, you don't really care.
find . -type f -exec sh -c 'jpegtran -optimize -progressive -outfile "../walls/$(basename {})" "{}"' \;