Skip to content
This repository was archived by the owner on Oct 14, 2020. It is now read-only.

Commit d78bf7c

Browse files
committed
Bugfixing wrong path references #13
1 parent 7b14b19 commit d78bf7c

File tree

1 file changed

+17
-29
lines changed

1 file changed

+17
-29
lines changed

README.md

Lines changed: 17 additions & 29 deletions
Original file line numberDiff line numberDiff line change
@@ -73,17 +73,17 @@ kubectl create namespace securecodebox-system
7373
helm -n securecodebox-system install securecodebox-operator ./operator/
7474

7575
# Deploy SCB scanner Charts for each security scanner you want to use (all optional)
76-
helm upgrade --install amass ./integrations/amass/
77-
helm upgrade --install kube-hunter ./integrations/kube-hunter/
78-
helm upgrade --install nikto ./integrations/nikto
79-
helm upgrade --install nmap ./integrations/nmap/
80-
helm upgrade --install ssh-scan ./integrations/ssh_scan/
81-
helm upgrade --install sslyze ./integrations/sslyze/
82-
helm upgrade --install trivy ./integrations/trivy/
83-
helm upgrade --install zap ./integrations/zap/
84-
helm upgrade --install wpscan ./integrations/wpscan/
85-
86-
# Optional Deploy some Demo Apps for scanning
76+
helm upgrade --install amass ./scanner/amass/
77+
helm upgrade --install kube-hunter ./scanner/kube-hunter/
78+
helm upgrade --install nikto ./scanner/nikto
79+
helm upgrade --install nmap ./scanner/nmap/
80+
helm upgrade --install ssh-scan ./scanner/ssh_scan/
81+
helm upgrade --install sslyze ./scanner/sslyze/
82+
helm upgrade --install trivy ./scanner/trivy/
83+
helm upgrade --install zap ./scanner/zap/
84+
helm upgrade --install wpscan ./scanner/wpscan/
85+
86+
# Optional Deploy some Demo Apps to test some scanning examples
8787
helm upgrade --install dummy-ssh ./demo-apps/dummy-ssh/
8888

8989
# Deploy secureCodeBox Hooks
@@ -102,20 +102,8 @@ helm upgrade --install elkh ./hooks/persistence-elastic/
102102
## Local Scan Examples
103103

104104
### E.g. localhost nmap scan
105-
kubectl apply -f operator/config/samples/execution_v1_scan/nmap_localhost.yaml
106-
kubectl apply -f operator/config/samples/execution_v1_scan/kube-hunter_in_cluster.yaml
107-
108-
## Public Scan Examples
109-
# E.g. www.securecodebox.io sslyze scan
110-
kubectl apply -f operator/config/samples/execution_v1_scan/nmap_securecodebox_io.yaml
111-
kubectl apply -f operator/config/samples/execution_v1_scan/amass_securecodebox_io.yaml
112-
kubectl apply -f operator/config/samples/execution_v1_scan/sslyze_securecodebox_io.yaml
113-
kubectl apply -f operator/config/samples/execution_v1_scan/nikto_securecodebox_io.yaml
114-
kubectl apply -f operator/config/samples/execution_v1_scan/ssh_iteratec_de.yaml
115-
kubectl apply -f operator/config/samples/execution_v1_scan/wpscan_nurdemteam_org.yaml
116-
kubectl apply -f operator/config/samples/execution_v1_scan/sslyze_securecodebox_io.yaml
117-
kubectl apply -f operator/config/samples/execution_v1_scan/trivy_mediawiki.yaml
118-
kubectl apply -f operator/config/samples/execution_v1_scan/trivy_juiceshop.yaml
105+
kubectl apply -f scanner/nmap/examples/localhost/scan.yaml
106+
kubectl apply -f scanner/ssh_scan/examples/localhost/scan.yaml
119107

120108
# Then get the current State of the Scan by running:
121109
kubectl get scans
@@ -128,10 +116,10 @@ kubectl get scans
128116
* SecretKey: `kubectl get secret securecodebox-operator-minio -n securecodebox-system -o=jsonpath='{.data.secretkey}' | base64 --decode; echo`
129117
* Port Forward Minio UI: `kubectl port-forward -n securecodebox-system service/securecodebox-operator-minio 9000:9000`
130118
* Elastic / Kibana UI:
131-
* User: `elastic`
132-
* Password: `kubectl get secret scb-elasticsearch-es-elastic-user -n scb-analytics -o=jsonpath='{.data.elastic}' | base64 --decode; echo`
133-
* Port Forward Kibana: `kubectl port-forward -n default service/persistence-elastic-kibana 5601:5601`
134-
* Port Forward Elasticsearch: `kubectl port-forward -n default service/elasticsearch-master 9200:9200`
119+
* User: `elastic`
120+
* Password: `kubectl get secret scb-elasticsearch-es-elastic-user -n scb-analytics -o=jsonpath='{.data.elastic}' | base64 --decode; echo`
121+
* Port Forward Kibana: `kubectl port-forward -n default service/persistence-elastic-kibana 5601:5601`
122+
* Port Forward Elasticsearch: `kubectl port-forward -n default service/elasticsearch-master 9200:9200`
135123

136124

137125
## How does it work?

0 commit comments

Comments
 (0)