From ac67f312785c3ee77fbf7bfa0201f5ccec850006 Mon Sep 17 00:00:00 2001 From: Moein Fatehi Date: Mon, 9 May 2022 13:06:56 +0430 Subject: [PATCH] update readme --- README.md | 23 ++++++++++++++++------- 1 file changed, 16 insertions(+), 7 deletions(-) diff --git a/README.md b/README.md index 0ba7932..d688207 100644 --- a/README.md +++ b/README.md @@ -1,4 +1,4 @@ -# XSS-challenges +# XSS Vulnerability Scenarios (challenges) This repository is a Dockerized php application containing some XSS vulnerability challenges.
The ideas behind challenges are:
* Javascript validation bypass @@ -10,18 +10,27 @@ The ideas behind challenges are:
* Exploiting XSS by bypassing escape characters -# Run this image -To run this image you need docker installed.
-Then run the command:
-```docker run -d -p 8008:80 moeinfatehi/xss_vulnerability_challenges```

+# Quick Start Using Docker +**Using docker hub (Quickest):** +1. To access the challenges, you need docker installed.
+2. Run this command to pull and run the image from docker hub:
`sudo docker run -d -p 9003:80 moeinfatehi/xss_vulnerability_challenges` +3. Access the challenges with this URL: http://localhost:9003

+ Help: ``` -d: detached mode (You can use terminal after running command -p: specifies port (you can change 8008 to whatever you want. If you don't have a web server on your host, set it to 80) ``` -
-Then request localhost:8008 to access the challenges.

+**Using docker-compose:** +1. To access the challenges, you need docker and docker-compose installed.
+2. Clone the repository
`git clone https://github.com/moeinfatehi/xss_vulnerability_challenges.git` +3. Open the main directory of the project (where docker-compose.yml file exists) and run: `docker-compose up` +4. Access the challenges with this URL: http://localhost:9003 + + + +
# Disclaimer