You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+18-18
Original file line number
Diff line number
Diff line change
@@ -1,6 +1,6 @@
1
1
# Exploit Host HTTP
2
2
3
-
Purpose made HTTP Docker file setup for hosting exploits for the web browser for Sony PlayStation devices and the Nintendo WiiU/Switch. This essentially has to be used with the [Exploit Host DNS](https://github.com/Al-Azif/exploit-host-DNS) component. It's possible to use it "standalone", but will require something to make the browser send the correct `Host` header with it's HTTP(S) requests.
3
+
Purpose made HTTP Docker file setup for hosting exploits for the web browser for Sony PlayStation devices and the Nintendo Wii/WiiU/Switch. This essentially has to be used with the [Exploit Host DNS](https://github.com/Al-Azif/exploit-host-DNS) component. It's possible to use it "standalone", but will require something to make the browser send the correct `Host` header with it's HTTP(S) requests.
4
4
5
5
## Features
6
6
@@ -16,7 +16,7 @@ When used in conjunction with [Exploit Host DNS](https://github.com/Al-Azif/expl
16
16
17
17
## Usage
18
18
19
-
This is setup to work right out of the box with [Exploit Host DNS](https://github.com/Al-Azif/exploit-host-DNS). However there are lots of options for your individual hosting wants/needs. I'll only show the basic usage here.
19
+
This is setup to work right out of the box with [Exploit Host DNS](https://github.com/Al-Azif/exploit-host-DNS). There are a lot of options for your individual hosting wants/needs; however, I'll only show the basic usage here.
20
20
21
21
### Command Line
22
22
@@ -26,7 +26,7 @@ This command will always pull the latest image from Docker Hub, run on the main
26
26
27
27
### Composer
28
28
29
-
This composer file will do the same as the commands above.
29
+
This composer file will do the same as the command above.
30
30
31
31
```yml
32
32
---
@@ -47,21 +47,21 @@ Start the compose file by calling `docker compose up -d` from the same location
| DEBUG | `false` | boolean | Show debug output for `entrypoint.sh` in the Docker log. |
53
+
| REDIRECT_TYPE | `http` | string | The protocol that is used for the hijacked landing page redirect. Valid values are `http` and `https`. |
54
+
| ROOT_DOMAIN| `the.gate` | string | The root domain that is used for hijacked landing page redirect. This is **ONLY** the domain itself. |
55
+
| ROOT_DOMAIN_PATH| none | string | Additional path to append to root domain for redirect. If needed you can add an alternative port here as well. |
56
+
| HIJACK_URL | none| string | Rather than hosting the hijacked landing page just redirect the request to another domain hosted elsewhere. If this is set, `ROOT_DOMAIN` and `ROOT_DOMAIN_PATH` are ignored. |
57
+
| NGINX_ACCESS_LOG| `false` | boolean | Enables the NGINX access log, located at `/var/log/nginx/access.log` |
58
+
| NGINX_ERROR_LOG| `false` | boolean | Enables the NGINX error log, located at `/var/log/nginx/error.log` |
59
+
| NGINX_ERROR_LOG_LEVEL| `warn`| string | The error log level for the NGINX error log. Valid values are `debug`, `info`, `notice`, `warn`, `error`, `crit`, `alert`, `emerg`. Ignored if `NGINX_ERROR_LOG` is `false` |
60
+
| TLS| `self` | string | Valid values are `self`, `letsencrypt`, and `mount`. |
61
+
| CF_IP_CORRECTION| `false` | boolean | Automatically correct CloudFlare IP addresses to the real IP address for logging. |
62
+
| CF_STRICT| `false` | boolean | |
63
+
| OCSP_STAPLING | `false` | boolean | |
64
+
| SEVER_HASH_BUCKET_SIZE_OVERRIDE | `false`| boolean | Overrides the `server_names_hash_bucket_size` option in NGINX to be `64`. Some systems have `32` as the default and that is not enough for our usage |
0 commit comments