Skip to content
This repository was archived by the owner on Oct 14, 2020. It is now read-only.

Commit cc288f6

Browse files
committed
#23 Fix all missing pathes for scanners
In one of the prvious commits we renamed the scanners direcotry, but forgotten to chnage all referncing places. Also fixed casing of URL and file names: Use always consistent lowercase. And fixed some spell and Markdown errors. Signed-off-by: Sven Strittmatter <sven.strittmatter@iteratec.com>
1 parent 1abb135 commit cc288f6

File tree

19 files changed

+113
-92
lines changed

19 files changed

+113
-92
lines changed

README.md

Lines changed: 12 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -76,15 +76,15 @@ helm -n securecodebox-system install securecodebox-operator ./operator/
7676
Optionally deploy SCB scanner Charts for each security scanner you want to use:
7777

7878
```bash
79-
helm upgrade --install amass ./scanner/amass/
80-
helm upgrade --install kube-hunter ./scanner/kube-hunter/
81-
helm upgrade --install nikto ./scanner/nikto
82-
helm upgrade --install nmap ./scanner/nmap/
83-
helm upgrade --install ssh-scan ./scanner/ssh_scan/
84-
helm upgrade --install sslyze ./scanner/sslyze/
85-
helm upgrade --install trivy ./scanner/trivy/
86-
helm upgrade --install zap ./scanner/zap/
87-
helm upgrade --install wpscan ./scanner/wpscan/
79+
helm upgrade --install amass ./scanners/amass/
80+
helm upgrade --install kube-hunter ./scanners/kube-hunter/
81+
helm upgrade --install nikto ./scanners/nikto
82+
helm upgrade --install nmap ./scanners/nmap/
83+
helm upgrade --install ssh-scan ./scanners/ssh_scan/
84+
helm upgrade --install sslyze ./scanners/sslyze/
85+
helm upgrade --install trivy ./scanners/trivy/
86+
helm upgrade --install zap ./scanners/zap/
87+
helm upgrade --install wpscan ./scanners/wpscan/
8888
```
8989

9090
Optional deploy some demo apps for scanning:
@@ -109,20 +109,20 @@ helm upgrade --install elkh ./hooks/persistence-elastic/
109109

110110
### Examples
111111

112-
Now everything is installed. You can try deploying scans from the `scanner/*/examples` directories.
112+
Now everything is installed. You can try deploying scans from the `scanners/*/examples` directories.
113113

114114
#### Local Scan Examples
115115

116116
E.g. localhost nmap scan:
117117

118118
```bash
119-
kubectl apply -f scanner/nmap/examples/localhost/scan.yaml
119+
kubectl apply -f scanners/nmap/examples/localhost/scan.yaml
120120
```
121121

122122
#### Public Scan Examples
123123

124124
```bash
125-
kubectl apply -f scanner/nmap/examples/scan.nmap.org/scan.yaml
125+
kubectl apply -f scanners/nmap/examples/scan.nmap.org/scan.yaml
126126
```
127127

128128
#### Then get the current State of the Scan by running:

scanners/amass/Chart.yaml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
apiVersion: v2
22
name: amass
3-
description: A Helm chart for the Amass security Scanner that integrates with the secureCodeBox.
3+
description: A Helm chart for the Amass security scanner that integrates with the secureCodeBox.
44

55
type: application
66
version: 0.1.0
@@ -11,8 +11,8 @@ keywords:
1111
- amass
1212
- scanner
1313
- secureCodeBox
14-
home: https://www.securecodebox.io/scanner/Amass
15-
icon: https://www.securecodebox.io/integrationIcons/Amass.svg
14+
home: https://www.securecodebox.io/scanners/amass
15+
icon: https://www.securecodebox.io/scannerIcons/Amass.svg
1616
sources:
1717
- https://github.com/secureCodeBox/secureCodeBox
1818
maintainers:

scanners/amass/README.md

Lines changed: 10 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
title: "Amass"
3-
path: "scanner/Amass"
3+
path: "scanners/amass"
44
category: "scanner"
55
usecase: "Subdomain Enumeration Scanner"
66
---
@@ -13,35 +13,37 @@ The OWASP Amass Project has developed a tool to help information security profes
1313

1414
## Deployment
1515

16-
The AMASS scanType can be deployed via helm.
16+
The AMASS scanType can be deployed via helm:
1717

1818
```bash
19-
helm upgrade --install amass ./scanner/amass/
19+
helm upgrade --install amass ./scanners/amass/
2020
```
2121

2222
## Examples
2323

2424
A set of examples can be found in the [examples](./examples) folder.
25+
2526
* Example *secureCodeBox.io* [scan](./examples/secureCodeBox.io/scan.yaml) and [findings](./examples/secureCodeBox.io/findings.yaml)
2627
* Example *example.com* [scan](./examples/secureCodeBox.io/scan.yaml) and [findings](./examples/secureCodeBox.io/findings.yaml)
2728

2829
## Configuration
2930

30-
The follwing security scan configuration example are based on the [Amass User Guide], please take a look at the original documentation for more configuration examples.
31+
The following security scan configuration example are based on the [Amass User Guide], please take a look at the original documentation for more configuration examples.
3132

3233
* The most basic use of the tool for subdomain enumeration: `amass enum -d example.com`
3334
* Typical parameters for DNS enumeration: `amass enum -v -src -ip -brute -min-for-recursive 2 -d example.com`
34-
35+
3536
Special command line options:
37+
3638
* Disable generation of altered names `amass enum -noalts -d example.com`
3739
* Turn off recursive brute forcing `amass enum -brute -norecursive -d example.com`
3840
* Disable saving data into a local database `amass enum -nolocaldb -d example.com`
3941
* Domain names separated by commas (can be used multiple times) `amass enum -d example.com`
4042

41-
4243
## Development
4344

4445
### Local setup
46+
4547
1. Clone the repository `git clone git@github.com:secureCodeBox/secureCodeBox-v2-alpha.git`
4648
2. Ensure you have node.js installed
4749
* On MacOs with brew package manager: `brew install node`
@@ -51,8 +53,8 @@ Special command line options:
5153
1. Install the dependencies `npm install`
5254
2. Update the parser function here: `./parser/parser.js`
5355
3. Update the parser tests here: `./parser/parser.test.js`
54-
4. Run the testsuite: `npm test`
56+
4. Run the test suite: `npm test`
5557

5658
[OWASP_Amass_Project]: https://owasp.org/www-project-amass/
5759
[Amass GitHub]: https://github.com/OWASP/Amass
58-
[Amass User Guide]: https://github.com/OWASP/Amass/blob/master/doc/user_guide.md
60+
[Amass User Guide]: https://github.com/OWASP/Amass/blob/master/doc/user_guide.md

scanners/kube-hunter/Chart.yaml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
apiVersion: v2
22
name: kube-hunter
3-
description: A Helm chart for the kube-hunter security Scanner that integrates with the secureCodeBox.
3+
description: A Helm chart for the kube-hunter security scanner that integrates with the secureCodeBox.
44

55
type: application
66
version: 0.1.0
@@ -11,8 +11,8 @@ keywords:
1111
- kube-hunter
1212
- scanner
1313
- secureCodeBox
14-
home: https://www.securecodebox.io/scanner/kube-hunter
15-
icon: https://www.securecodebox.io/integrationIcons/kube-hunter.svg
14+
home: https://www.securecodebox.io/scanners/kube-hunter
15+
icon: https://www.securecodebox.io/scannerIcons/kube-hunter.svg
1616
sources:
1717
- https://github.com/secureCodeBox/secureCodeBox
1818
maintainers:

scanners/kube-hunter/README.md

Lines changed: 8 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
title: "kube-hunter"
3-
path: "scanner/kube-hunter"
3+
path: "scanners/kube-hunter"
44
category: "scanner"
55
usecase: "Kubernetes Vulnerability Scanner"
66
---
@@ -13,20 +13,21 @@ To learn more about the kube-hunter scanner itself visit [kube-hunter GitHub] or
1313

1414
## Deployment
1515

16-
The kube-hunter ScanType can be deployed via helm.
16+
The kube-hunter ScanType can be deployed via helm:
1717

1818
```bash
19-
helm upgrade --install kube-hunter ./scanner/kube-hunter/
19+
helm upgrade --install kube-hunter ./scanners/kube-hunter/
2020
```
2121

2222
## Examples
2323

2424
A set of examples can be found in the [examples](./examples) folder.
25+
2526
* Example *in-cluster* [scan](./examples/in-cluster/scan.yaml) and [findings](./examples/in-cluster/findings.yaml)
2627

2728
## Configuration
2829

29-
The follwing security scan configuration example are based on the [kube-hunter Documentation], please take a look at the original documentation for more configuration examples.
30+
The following security scan configuration example are based on the [kube-hunter Documentation], please take a look at the original documentation for more configuration examples.
3031

3132
* To specify remote machines for hunting, select option 1 or use the --remote option. Example: `kube-hunter --remote some.node.com`
3233
* To specify interface scanning, you can use the --interface option (this will scan all of the machine's network interfaces). Example: `kube-hunter --interface`
@@ -35,6 +36,7 @@ The follwing security scan configuration example are based on the [kube-hunter D
3536
## Development
3637

3738
### Local setup
39+
3840
1. Clone the repository `git clone git@github.com:secureCodeBox/secureCodeBox-v2-alpha.git`
3941
2. Ensure you have node.js installed
4042
* On MacOs with brew package manager: `brew install node`
@@ -44,8 +46,8 @@ The follwing security scan configuration example are based on the [kube-hunter D
4446
1. Install the dependencies `npm install`
4547
2. Update the parser function here: `./parser/parser.js`
4648
3. Update the parser tests here: `./parser/parser.test.js`
47-
4. Run the testsuite: `npm test`
49+
4. Run the test suite: `npm test`
4850

4951
[kube-hunter Website]: https://kube-hunter.aquasec.com/
5052
[kube-hunter GitHub]: https://github.com/aquasecurity/kube-hunter
51-
[kube-hunter Documentation]: https://github.com/aquasecurity/kube-hunter#scanning-options
53+
[kube-hunter Documentation]: https://github.com/aquasecurity/kube-hunter#scanning-options

scanners/nikto/Chart.yaml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
apiVersion: v2
22
name: nikto
3-
description: A Helm chart for the Nikto security Scanner that integrates with the secureCodeBox.
3+
description: A Helm chart for the Nikto security scanner that integrates with the secureCodeBox.
44

55
type: application
66
version: 0.1.0
@@ -11,8 +11,8 @@ keywords:
1111
- nikto
1212
- scanner
1313
- secureCodeBox
14-
home: https://www.securecodebox.io/scanner/Nikto
15-
icon: https://www.securecodebox.io/integrationIcons/Nikto.svg
14+
home: https://www.securecodebox.io/scanners/nikto
15+
icon: https://www.securecodebox.io/scannerIcons/Nikto.svg
1616
sources:
1717
- https://github.com/secureCodeBox/secureCodeBox
1818
maintainers:

scanners/nikto/README.md

Lines changed: 9 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
title: "Nikto"
3-
path: "scanner/Nikto"
3+
path: "scanners/nikto"
44
category: "scanner"
55
usecase: "Webserver Vulnerability Scanner"
66
---
@@ -13,20 +13,21 @@ Nikto is a free software command-line vulnerability scanner that scans webserver
1313

1414
## Deployment
1515

16-
The Nikto ScanType can be deployed via helm.
16+
The Nikto ScanType can be deployed via helm:
1717

1818
```bash
19-
helm upgrade --install nikto ./scanner/nikto/
19+
helm upgrade --install nikto ./scanners/nikto/
2020
```
2121

2222
## Examples
2323

2424
A set of examples can be found in the [examples](./examples) folder.
25+
2526
* Example *secureCodeBox.io* [scan](./examples/secureCodeBox.io/scan.yaml) and [findings](./examples/secureCodeBox.io/findings.yaml)
2627

2728
## Configuration
2829

29-
The follwing security scan configuration example are based on the [Nikto Documentation](https://cirt.net/nikto2-docs/usage.html#id2780332), please take a look at the original documentation for more configuration examples.
30+
The following security scan configuration example are based on the [Nikto Documentation](https://cirt.net/nikto2-docs/usage.html#id2780332), please take a look at the original documentation for more configuration examples.
3031

3132
* The most basic Nikto scan requires simply a host to target, since port 80 is assumed if none is specified. The host can either be an IP or a hostname of a machine, and is specified using the -h (-host) option. This will scan the IP 192.168.0.1 on TCP port 80: `-h 192.168.0.1`
3233
* To check on a different port, specify the port number with the -p (-port) option. This will scan the IP 192.168.0.1 on TCP port 443: `-h 192.168.0.1 -p 443`
@@ -49,11 +50,12 @@ Nikto also has a comprehensive list of [command line options documented](https:/
4950
* a - Authentication Bypass. Allows client to access a resource it should not be allowed to access.
5051
* b - Software Identification. Installed software or program could be positively identified.
5152
* c - Remote source inclusion. Software allows remote inclusion of source code.
52-
* x - Reverse Tuning Options. Perform exclusion of the specified tuning type instead of inclusion of the specified tuning type
53+
* x - Reverse Tuning Options. Perform exclusion of the specified tuning type instead of inclusion of the specified tuning type
5354

5455
## Development
5556

5657
### Local setup
58+
5759
1. Clone the repository `git clone git@github.com:secureCodeBox/secureCodeBox-v2-alpha.git`
5860
2. Ensure you have node.js installed
5961
* On MacOs with brew package manager: `brew install node`
@@ -63,7 +65,7 @@ Nikto also has a comprehensive list of [command line options documented](https:/
6365
1. Install the dependencies `npm install`
6466
2. Update the parser function here: `./parser/parser.js`
6567
3. Update the parser tests here: `./parser/parser.test.js`
66-
4. Run the testsuite: `npm test`
68+
4. Run the test suite: `npm test`
6769

6870
[cirt.net]: https://cirt.net/
69-
[nikto github]: https://github.com/sullo/nikto
71+
[nikto github]: https://github.com/sullo/nikto

scanners/nmap/Chart.yaml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -11,8 +11,8 @@ keywords:
1111
- nmap
1212
- scanner
1313
- secureCodeBox
14-
home: https://www.securecodebox.io/scanner/Nmap
15-
icon: https://www.securecodebox.io/integrationIcons/Nmap.svg
14+
home: https://www.securecodebox.io/scanners/nmap
15+
icon: https://www.securecodebox.io/scannerIcons/Nmap.svg
1616
sources:
1717
- https://github.com/secureCodeBox/secureCodeBox
1818
maintainers:

scanners/nmap/README.md

Lines changed: 8 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
title: "Nmap"
3-
path: "scanner/Nmap"
3+
path: "scanners/nmap"
44
category: "scanner"
55
usecase: "Network Scanner"
66
---
@@ -15,15 +15,16 @@ To learn more about the Nmap scanner itself visit [nmap.org].
1515

1616
## Deployment
1717

18-
The Nmap ScanType can be deployed via helm.
18+
The Nmap ScanType can be deployed via helm:
1919

2020
```bash
21-
helm install nmap ./scanner/nmap/
21+
helm install nmap ./scanners/nmap/
2222
```
2323

2424
## Examples
2525

2626
A set of examples can be found in the [examples](./examples) folder.
27+
2728
* Example *local-network* [scan](./examples/local-network/scan.yaml) and [findings](./examples/local-network/findings.yaml)
2829
* Example *localhost* [scan](./examples/local-network/scan.yaml) and [findings](./examples/local-network/findings.yaml)
2930
* Example *scan.nmap.org* [scan](./examples/local-network/scan.yaml) and [findings](./examples/local-network/findings.yaml)
@@ -49,6 +50,7 @@ Some useful example parameters listed below:
4950
## Development
5051

5152
### Local setup
53+
5254
1. Clone the repository `git clone git@github.com:secureCodeBox/secureCodeBox-v2-alpha.git`
5355
2. Ensure you have node.js installed
5456
* On MacOs with brew package manager: `brew install node`
@@ -58,7 +60,8 @@ Some useful example parameters listed below:
5860
1. Install the dependencies `npm install`
5961
2. Update the parser function here: `./parser/parser.js`
6062
3. Update the parser tests here: `./parser/parser.test.js`
61-
4. Run the testsuite: `npm test`
63+
4. Run the test suite: `npm test`
6264

6365
#### Basic scanner tests
64-
If you want to test sslyze localy you can use brew (only on macOS) to install it: `brew install nmap`
66+
67+
If you want to test sslyze localy you can use brew (only on macOS) to install it: `brew install nmap`

scanners/ssh_scan/Chart.yaml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
apiVersion: v2
22
name: ssh-scan
3-
description: A Helm chart for the SSH_Scan security Scanner that integrates with the secureCodeBox.
3+
description: A Helm chart for the SSH_Scan security scanner that integrates with the secureCodeBox.
44

55
type: application
66
version: 0.1.0
@@ -11,8 +11,8 @@ keywords:
1111
- ssh
1212
- scanner
1313
- secureCodeBox
14-
home: https://www.securecodebox.io/scanner/SSH
15-
icon: https://www.securecodebox.io/integrationIcons/SSH.svg
14+
home: https://www.securecodebox.io/scanners/ssh
15+
icon: https://www.securecodebox.io/scannerIcons/SSH.svg
1616
sources:
1717
- https://github.com/secureCodeBox/secureCodeBox
1818
maintainers:

0 commit comments

Comments
 (0)