Skip to content
This repository was archived by the owner on Oct 16, 2024. It is now read-only.

Commit 93f03dc

Browse files
Update _index.md
1 parent d4d5cbf commit 93f03dc

File tree

1 file changed

+9
-2
lines changed

1 file changed

+9
-2
lines changed

content/_index.md

Lines changed: 9 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,14 @@ url: /
77
### What is a CVEX?
88
CVEX is an executable that runs a software exploit and outputs relevant data in the form of network traffic. Each CVEX is packaged in the form of a Docker container, which has the benefit of being convenient and compatible with any operating system. As a result, CVEXes can be run and analyzed by any person curious to understand the workings of a software vulnerability.
99

10-
### How to run a CVEX
10+
### How to run a CVEX (simple)
11+
1. Visit [link](https://github.com/ucsb-seclab/xplor-cvex/tree/main/data/cvex_data/compose-files)
12+
2. Download any compose yaml file
13+
3. Install `docker` and ensure you have `docker-compose`
14+
4. run `docker compose -f <compose-file-name.yml> up`
15+
5. Open `localhost:<port>` and Voila!
16+
17+
### How to run CVEX with access to source code
1118
1. Pull from the GitHub Container Registry (GHCR):
1219
&nbsp;&nbsp;a. 'docker pull ghcr.io/ucsb-seclab/NAME_OF_CONTAINER:TAG'
1320
&nbsp;&nbsp;b. for example, 'docker pull ghcr.io/ucsb-seclab/demo/client:latest'
@@ -33,4 +40,4 @@ CVEX is an executable that runs a software exploit and outputs relevant data in
3340
This static HUGO website serves as a database of completed CVEXes. These CVEXes were created by the Team of Professors Kruegel & Vigna, with 4 undergraduate researchers affiliated with UCSB's Early Research Scholars Program 2023-2024 cohort.
3441

3542

36-
*Special thanks to Noah Spahn, Professor Giovanni Vigna, and Professor Christopher Kruegel, and UCSB SecLab.*
43+
*Special thanks to Noah Spahn, Professor Giovanni Vigna, and Professor Christopher Kruegel, and UCSB SecLab.*

0 commit comments

Comments
 (0)