package com.asa.hack.pikachu;

public class A {

	
	/**
	 * 漏洞的靶子pikachu
	 * 
	 * 
	 * 
	 * docker安装
	 * 
	 * curl -LJO https://codeload.github.com/zhuifengshaonianhanlu/pikachu/zip/master
	 * 
	 * unzip pikachu-master.zip
	 * 
	 * cd /pikachu-master
	 * docker build -t "pikachu" .
	 * docker run -d -p 8080:80 pikachu
	 * docker run -itd -p 8080:80 -p 13306:13306 pikachu
	 * docker run -itd -p 8080:80 -p 3306:3306 pikachu
	 * 
	 * update user set authentication_string=password(‘root’) where user=‘root’;
	 * 
	 * 
	 * docker ps -a
	 * docker rm 5c92138c8e94
	 * docker exec -it c0047c63e937 bash
	 * 
	 * 
	 * 
	 * 
	 * 
	 * docker run --name runoob-php-nginx -p 8083:80 -d -v ~/nginx/www:/usr/share/nginx/html:ro -v ~/nginx/conf/conf.d:/etc/nginx/conf.d:ro –link myphp-fpm:php nginx
	 * 
	 * 
	 * 
	 * 
	 * 
	 * 
	 */
	
	
}
