From 93f03dc0b6c30e414b629688de6e9fa975d6f040 Mon Sep 17 00:00:00 2001 From: Sometimes_Puzzled Date: Fri, 7 Jun 2024 12:58:46 -0700 Subject: [PATCH] Update _index.md --- content/_index.md | 11 +++++++++-- 1 file changed, 9 insertions(+), 2 deletions(-) diff --git a/content/_index.md b/content/_index.md index a57a804..0d6d6b7 100755 --- a/content/_index.md +++ b/content/_index.md @@ -7,7 +7,14 @@ url: / ### What is a CVEX? CVEX is an executable that runs a software exploit and outputs relevant data in the form of network traffic. Each CVEX is packaged in the form of a Docker container, which has the benefit of being convenient and compatible with any operating system. As a result, CVEXes can be run and analyzed by any person curious to understand the workings of a software vulnerability. -### How to run a CVEX +### How to run a CVEX (simple) +1. Visit [link](https://github.com/ucsb-seclab/xplor-cvex/tree/main/data/cvex_data/compose-files) +2. Download any compose yaml file +3. Install `docker` and ensure you have `docker-compose` +4. run `docker compose -f up` +5. Open `localhost:` and Voila! + +### How to run CVEX with access to source code 1. Pull from the GitHub Container Registry (GHCR):   a. 'docker pull ghcr.io/ucsb-seclab/NAME_OF_CONTAINER:TAG'   b. for example, 'docker pull ghcr.io/ucsb-seclab/demo/client:latest' @@ -33,4 +40,4 @@ CVEX is an executable that runs a software exploit and outputs relevant data in This static HUGO website serves as a database of completed CVEXes. These CVEXes were created by the Team of Professors Kruegel & Vigna, with 4 undergraduate researchers affiliated with UCSB's Early Research Scholars Program 2023-2024 cohort. -*Special thanks to Noah Spahn, Professor Giovanni Vigna, and Professor Christopher Kruegel, and UCSB SecLab.* \ No newline at end of file +*Special thanks to Noah Spahn, Professor Giovanni Vigna, and Professor Christopher Kruegel, and UCSB SecLab.*