Open meigea opened 5 years ago
docker pull actanble/vuls 如果要build 参考这个 https://github.com/meigea/kali-penetration-testing/issues/12 From centos:7 ADD /etc/yum.repos.d /etc/ COPY ./install_vuls.sh /root/ bash /root/install_vuls.sh WORKDIR /root/
docker pull actanble/vuls
From centos:7 ADD /etc/yum.repos.d /etc/ COPY ./install_vuls.sh /root/ bash /root/install_vuls.sh WORKDIR /root/
docker run -itd --name=vuls-server -w /root/ actanble/vuls bash
docker run -itd --name=vuls-server -w /root/ actanble/vuls bash ssh-keygen -t rsa ssh-copy-id -i /root/.ssh/id_rsa.pub root@VHOST ##直连信任 ssh root@root@VHOST && yum -y install yum-* && exit ## 添加到 known_host_authkeys vi config.toml ## 编辑预漏洞扫描的主机配置
vuls configtest ## 测试配置文件 vuls scan # https://vuls.io/docs/en/usage-scan-non-os-packages.html vuls report # https://vuls.io/docs/en/usage-report.html
## 注意事项 - 1, 部署过程中,如果build 一定切忌分配足够大的内存,1.5G+ - 2, 切记信任主机和相关设置和登陆尝试 - 3, 注意待深度测试主机必须安装yum插件集合。 ` yum -y install yum-* ` - 4, 报告处理以及vulsrepo工具的使用这里掠过 - 5, 注意更新 CVE,GOST要在有国际网的条件下。似乎也可以不用。 ## 深度扫描配置文件 1 - config.toml ```conf [servers] #[servers.remote99] #host = "localhost" #port = "3222" #user = "root" #keyPath = "/root/.ssh/id_rsa" #scanMode = ["deep"] [servers.vultrv6] host = "v6.kac.fun" port = "22" user = "root" keyPath = "/root/.ssh/id_rsa" scanMode = ["deep"]
欢迎大家新建自己的Docker进行更新分享给没有墙外主机的朋友!!
ssh 信任
# 生成密钥 - `ssh-keygen -t rsa -b 4096 -c secname -C "Generate by myself in 2019-3-7"` cat .ssh/id_rsa.pub >> .ssh/authorized_keys
https://github.com/the-champions-of-capua/penetration/issues/1
详细教程
Docker 安装
创建容器
docker run -itd --name=vuls-server -w /root/ actanble/vuls bash
执行操作
vuls configtest ## 测试配置文件 vuls scan # https://vuls.io/docs/en/usage-scan-non-os-packages.html vuls report # https://vuls.io/docs/en/usage-report.html
vuls report -format-full-text ## 全部展示
vuls tui ### https://vuls.io/docs/en/usage-tui.html
结果察看
文档参考