You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository was archived by the owner on Oct 14, 2020. It is now read-only.
@@ -13,35 +13,37 @@ The OWASP Amass Project has developed a tool to help information security profes
13
13
14
14
## Deployment
15
15
16
-
The AMASS scanType can be deployed via helm.
16
+
The AMASS scanType can be deployed via helm:
17
17
18
18
```bash
19
-
helm upgrade --install amass ./scanner/amass/
19
+
helm upgrade --install amass ./scanners/amass/
20
20
```
21
21
22
22
## Examples
23
23
24
24
A set of examples can be found in the [examples](./examples) folder.
25
+
25
26
* Example *secureCodeBox.io*[scan](./examples/secureCodeBox.io/scan.yaml) and [findings](./examples/secureCodeBox.io/findings.yaml)
26
27
* Example *example.com*[scan](./examples/secureCodeBox.io/scan.yaml) and [findings](./examples/secureCodeBox.io/findings.yaml)
27
28
28
29
## Configuration
29
30
30
-
The follwing security scan configuration example are based on the [Amass User Guide], please take a look at the original documentation for more configuration examples.
31
+
The following security scan configuration example are based on the [Amass User Guide], please take a look at the original documentation for more configuration examples.
31
32
32
33
* The most basic use of the tool for subdomain enumeration: `amass enum -d example.com`
33
34
* Typical parameters for DNS enumeration: `amass enum -v -src -ip -brute -min-for-recursive 2 -d example.com`
A set of examples can be found in the [examples](./examples) folder.
25
+
25
26
* Example *in-cluster*[scan](./examples/in-cluster/scan.yaml) and [findings](./examples/in-cluster/findings.yaml)
26
27
27
28
## Configuration
28
29
29
-
The follwing security scan configuration example are based on the [kube-hunter Documentation], please take a look at the original documentation for more configuration examples.
30
+
The following security scan configuration example are based on the [kube-hunter Documentation], please take a look at the original documentation for more configuration examples.
30
31
31
32
* To specify remote machines for hunting, select option 1 or use the --remote option. Example: `kube-hunter --remote some.node.com`
32
33
* To specify interface scanning, you can use the --interface option (this will scan all of the machine's network interfaces). Example: `kube-hunter --interface`
@@ -35,6 +36,7 @@ The follwing security scan configuration example are based on the [kube-hunter D
35
36
## Development
36
37
37
38
### Local setup
39
+
38
40
1. Clone the repository `git clone git@github.com:secureCodeBox/secureCodeBox-v2-alpha.git`
39
41
2. Ensure you have node.js installed
40
42
* On MacOs with brew package manager: `brew install node`
@@ -44,8 +46,8 @@ The follwing security scan configuration example are based on the [kube-hunter D
44
46
1. Install the dependencies `npm install`
45
47
2. Update the parser function here: `./parser/parser.js`
46
48
3. Update the parser tests here: `./parser/parser.test.js`
Copy file name to clipboardExpand all lines: scanners/nikto/README.md
+9-7Lines changed: 9 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,6 +1,6 @@
1
1
---
2
2
title: "Nikto"
3
-
path: "scanner/Nikto"
3
+
path: "scanners/nikto"
4
4
category: "scanner"
5
5
usecase: "Webserver Vulnerability Scanner"
6
6
---
@@ -13,20 +13,21 @@ Nikto is a free software command-line vulnerability scanner that scans webserver
13
13
14
14
## Deployment
15
15
16
-
The Nikto ScanType can be deployed via helm.
16
+
The Nikto ScanType can be deployed via helm:
17
17
18
18
```bash
19
-
helm upgrade --install nikto ./scanner/nikto/
19
+
helm upgrade --install nikto ./scanners/nikto/
20
20
```
21
21
22
22
## Examples
23
23
24
24
A set of examples can be found in the [examples](./examples) folder.
25
+
25
26
* Example *secureCodeBox.io*[scan](./examples/secureCodeBox.io/scan.yaml) and [findings](./examples/secureCodeBox.io/findings.yaml)
26
27
27
28
## Configuration
28
29
29
-
The follwing security scan configuration example are based on the [Nikto Documentation](https://cirt.net/nikto2-docs/usage.html#id2780332), please take a look at the original documentation for more configuration examples.
30
+
The following security scan configuration example are based on the [Nikto Documentation](https://cirt.net/nikto2-docs/usage.html#id2780332), please take a look at the original documentation for more configuration examples.
30
31
31
32
* The most basic Nikto scan requires simply a host to target, since port 80 is assumed if none is specified. The host can either be an IP or a hostname of a machine, and is specified using the -h (-host) option. This will scan the IP 192.168.0.1 on TCP port 80: `-h 192.168.0.1`
32
33
* To check on a different port, specify the port number with the -p (-port) option. This will scan the IP 192.168.0.1 on TCP port 443: `-h 192.168.0.1 -p 443`
@@ -49,11 +50,12 @@ Nikto also has a comprehensive list of [command line options documented](https:/
49
50
* a - Authentication Bypass. Allows client to access a resource it should not be allowed to access.
50
51
* b - Software Identification. Installed software or program could be positively identified.
51
52
* c - Remote source inclusion. Software allows remote inclusion of source code.
52
-
* x - Reverse Tuning Options. Perform exclusion of the specified tuning type instead of inclusion of the specified tuning type
53
+
* x - Reverse Tuning Options. Perform exclusion of the specified tuning type instead of inclusion of the specified tuning type
53
54
54
55
## Development
55
56
56
57
### Local setup
58
+
57
59
1. Clone the repository `git clone git@github.com:secureCodeBox/secureCodeBox-v2-alpha.git`
58
60
2. Ensure you have node.js installed
59
61
* On MacOs with brew package manager: `brew install node`
@@ -63,7 +65,7 @@ Nikto also has a comprehensive list of [command line options documented](https:/
63
65
1. Install the dependencies `npm install`
64
66
2. Update the parser function here: `./parser/parser.js`
65
67
3. Update the parser tests here: `./parser/parser.test.js`
0 commit comments