Anyone have any good external pen testing tools that you’ve used on your self hosted setup? Mine is pretty secure overall but I would like to be able to scan the WAN for vulnerabilities or misconfigurations just to make sure I haven’t missed anything.

  • sv1sjp@lemmy.world
    link
    fedilink
    English
    arrow-up
    8
    ·
    7 months ago

    You can try to scan your server with vulnerability assessment tools such as Nessus (it is available as a docker container) or sn1per which is open source.

    • moonpiedumplings@programming.dev
      link
      fedilink
      English
      arrow-up
      1
      ·
      edit-2
      7 months ago

      sn1per is not open source, according to the OSI’s definition

      The license for sn1per can be found here: https://github.com/1N3/Sn1per/blob/master/LICENSE.md

      It’s more a EULA than an actual license. It prohibits a lot of stuff, and is basically source-available.

      You agree not to create any product or service from any par of the Code from this Project, paid or free

      There is also:

      Sn1perSecurity LLC reserves the right to change the licensing terms at any time, without advance notice. Sn1perSecurity LLC reserves the right to terminate your license at any time.

      So yeah. I decided to test it out anyways… but what I see… is not promising.

      FROM docker.io/blackarchlinux/blackarch:latest
      
      # Upgrade system
      RUN pacman -Syu --noconfirm
      
      # Install sn1per from official repository
      RUN pacman -Sy sn1per --noconfirm
      
      CMD ["sn1per"]
      

      The two pacman commands are redundant. You only need to run pacman -Syu sn1per --noconfirm once. This also goes against docker best practice, as it creates two layers where only one would be necessary. In addition to that, best practice also includes deleting cache files, which isn’t done here. The final docker image is probably significantly larger than it needs to be.

      Their kali image has similar issues:

      RUN set -x \
              && apt -yqq update \
              && apt -yqq full-upgrade \
              && apt clean
      RUN apt install --yes metasploit-framework
      

      https://www.docker.com/blog/intro-guide-to-dockerfile-best-practices/

      It’s still building right now. I might edit this post with more info if it’s worth it. I really just want a command-line vulnerability scanner, and sn1per seems to offer that with greenbone/openvas as a backend.

      I could modify the dockerfiles with something better, but I don’t know if I’m legally allowed to do so outside of their repo, and I don’t feel comfortable contributing to a repo that’s not FOSS.