@@ -73,17 +73,17 @@ kubectl create namespace securecodebox-system
7373helm -n securecodebox-system install securecodebox-operator ./operator/
7474
7575# Deploy SCB scanner Charts for each security scanner you want to use (all optional)
76- helm upgrade --install amass ./integrations /amass/
77- helm upgrade --install kube-hunter ./integrations /kube-hunter/
78- helm upgrade --install nikto ./integrations /nikto
79- helm upgrade --install nmap ./integrations /nmap/
80- helm upgrade --install ssh-scan ./integrations /ssh_scan/
81- helm upgrade --install sslyze ./integrations /sslyze/
82- helm upgrade --install trivy ./integrations /trivy/
83- helm upgrade --install zap ./integrations /zap/
84- helm upgrade --install wpscan ./integrations /wpscan/
85-
86- # Optional Deploy some Demo Apps for scanning
76+ helm upgrade --install amass ./scanner /amass/
77+ helm upgrade --install kube-hunter ./scanner /kube-hunter/
78+ helm upgrade --install nikto ./scanner /nikto
79+ helm upgrade --install nmap ./scanner /nmap/
80+ helm upgrade --install ssh-scan ./scanner /ssh_scan/
81+ helm upgrade --install sslyze ./scanner /sslyze/
82+ helm upgrade --install trivy ./scanner /trivy/
83+ helm upgrade --install zap ./scanner /zap/
84+ helm upgrade --install wpscan ./scanner /wpscan/
85+
86+ # Optional Deploy some Demo Apps to test some scanning examples
8787helm upgrade --install dummy-ssh ./demo-apps/dummy-ssh/
8888
8989# Deploy secureCodeBox Hooks
@@ -102,20 +102,8 @@ helm upgrade --install elkh ./hooks/persistence-elastic/
102102# # Local Scan Examples
103103
104104# ## E.g. localhost nmap scan
105- kubectl apply -f operator/config/samples/execution_v1_scan/nmap_localhost.yaml
106- kubectl apply -f operator/config/samples/execution_v1_scan/kube-hunter_in_cluster.yaml
107-
108- # # Public Scan Examples
109- # E.g. www.securecodebox.io sslyze scan
110- kubectl apply -f operator/config/samples/execution_v1_scan/nmap_securecodebox_io.yaml
111- kubectl apply -f operator/config/samples/execution_v1_scan/amass_securecodebox_io.yaml
112- kubectl apply -f operator/config/samples/execution_v1_scan/sslyze_securecodebox_io.yaml
113- kubectl apply -f operator/config/samples/execution_v1_scan/nikto_securecodebox_io.yaml
114- kubectl apply -f operator/config/samples/execution_v1_scan/ssh_iteratec_de.yaml
115- kubectl apply -f operator/config/samples/execution_v1_scan/wpscan_nurdemteam_org.yaml
116- kubectl apply -f operator/config/samples/execution_v1_scan/sslyze_securecodebox_io.yaml
117- kubectl apply -f operator/config/samples/execution_v1_scan/trivy_mediawiki.yaml
118- kubectl apply -f operator/config/samples/execution_v1_scan/trivy_juiceshop.yaml
105+ kubectl apply -f scanner/nmap/examples/localhost/scan.yaml
106+ kubectl apply -f scanner/ssh_scan/examples/localhost/scan.yaml
119107
120108# Then get the current State of the Scan by running:
121109kubectl get scans
@@ -128,10 +116,10 @@ kubectl get scans
128116 * SecretKey: ` kubectl get secret securecodebox-operator-minio -n securecodebox-system -o=jsonpath='{.data.secretkey}' | base64 --decode; echo `
129117 * Port Forward Minio UI: ` kubectl port-forward -n securecodebox-system service/securecodebox-operator-minio 9000:9000 `
130118* Elastic / Kibana UI:
131- * User: ` elastic `
132- * Password: ` kubectl get secret scb-elasticsearch-es-elastic-user -n scb-analytics -o=jsonpath='{.data.elastic}' | base64 --decode; echo `
133- * Port Forward Kibana: ` kubectl port-forward -n default service/persistence-elastic-kibana 5601:5601 `
134- * Port Forward Elasticsearch: ` kubectl port-forward -n default service/elasticsearch-master 9200:9200 `
119+ * User: ` elastic `
120+ * Password: ` kubectl get secret scb-elasticsearch-es-elastic-user -n scb-analytics -o=jsonpath='{.data.elastic}' | base64 --decode; echo `
121+ * Port Forward Kibana: ` kubectl port-forward -n default service/persistence-elastic-kibana 5601:5601 `
122+ * Port Forward Elasticsearch: ` kubectl port-forward -n default service/elasticsearch-master 9200:9200 `
135123
136124
137125## How does it work?
0 commit comments