Self Host Pen Testing
from jubilationtcornpone@sh.itjust.works to selfhosted@lemmy.world on 20 Apr 15:59
https://sh.itjust.works/post/18111293

Anyone have any good external pen testing tools that you’ve used on your self hosted setup? Mine is pretty secure overall but I would like to be able to scan the WAN for vulnerabilities or misconfigurations just to make sure I haven’t missed anything.

#selfhosted

threaded - newest

Kuvwert@lemm.ee on 20 Apr 16:23 next collapse

I’d like to know the answer here as well

sv1sjp@lemmy.world on 20 Apr 16:49 next collapse

You can try to scan your server with vulnerability assessment tools such as Nessus (it is available as a docker container) or sn1per which is open source.

moonpiedumplings@programming.dev on 23 Apr 03:00 collapse

sn1per is not open source, according to the OSI’s definition

The license for sn1per can be found here: github.com/1N3/Sn1per/blob/master/LICENSE.md

It’s more a EULA than an actual license. It prohibits a lot of stuff, and is basically source-available.

You agree not to create any product or service from any par of the Code from this Project, paid or free

There is also:

Sn1perSecurity LLC reserves the right to change the licensing terms at any time, without advance notice. Sn1perSecurity LLC reserves the right to terminate your license at any time.

So yeah. I decided to test it out anyways… but what I see… is not promising.

FROM docker.io/blackarchlinux/blackarch:latest

# Upgrade system
RUN pacman -Syu --noconfirm

# Install sn1per from official repository
RUN pacman -Sy sn1per --noconfirm

CMD ["sn1per"]

The two pacman commands are redundant. You only need to run pacman -Syu sn1per --noconfirm once. This also goes against docker best practice, as it creates two layers where only one would be necessary. In addition to that, best practice also includes deleting cache files, which isn’t done here. The final docker image is probably significantly larger than it needs to be.

Their kali image has similar issues:

RUN set -x \
        && apt -yqq update \
        && apt -yqq full-upgrade \
        && apt clean
RUN apt install --yes metasploit-framework

docker.com/…/intro-guide-to-dockerfile-best-pract…

It’s still building right now. I might edit this post with more info if it’s worth it. I really just want a command-line vulnerability scanner, and sn1per seems to offer that with greenbone/openvas as a backend.

I could modify the dockerfiles with something better, but I don’t know if I’m legally allowed to do so outside of their repo, and I don’t feel comfortable contributing to a repo that’s not FOSS.

bobs_monkey@lemm.ee on 20 Apr 17:19 next collapse

Probably anything within the Kali Linux suite or any security-centric distribution. If possible, boot it up to a laptop hooked to a phone hotspot or any network outside your home network, route through a VPN, determine your WAN IP, and go to town.

0xD@infosec.pub on 20 Apr 17:35 collapse

I’m a big fan of hashcat for this use case myself! I route it through WS, however. I like being on the bleeding edge.

catloaf@lemm.ee on 20 Apr 17:33 next collapse

monitor.shodan.io

Not sure if there’s a free tier. Lifetime memberships go on sale for cheap at least once a year, though.

Personally I’d run a free VM in the cloud and scan yourself with nessus, nmap, and such. Trying to scan yourself from inside doesn’t really work well for some reason. I assume it’s something to do with routing.

0xD@infosec.pub on 20 Apr 17:40 next collapse

Check out openvas.

github.com/greenbone/openvas-scanner

I use Nessus professionally, they are somewhat similar. I can’t decide which one has the worse user interface.

Mikelius@lemmy.ml on 21 Apr 07:07 next collapse

Plus 1 to openvas. UI is indeed horrendous though.

Be careful running high load tests against sensitive devices. I once ran it against a PoE switch I used for my cameras and it did something so crazy that it required me not to only power cycle the switch, but to disconnect all the cameras first and then power cycle. Was super confusing and felt like it found a way to short the device lol. Scared the hell out of me.

That being said, I’ve found many many things to improve on my devices thanks to openvas.

0xD@infosec.pub on 21 Apr 09:43 collapse

I had a colleague at work years ago who did his Master’s thesis on network scanning. He ran a PoC in the company’s network and had all the printers print hundreds of pages.

We learned that printers suck and that we should always know our payloads and targets 😁

kjake@infosec.pub on 22 Apr 15:37 collapse

Another +1 to openvas. Specifically, I have had much luck with this Dockerized version: github.com/immauss/openvas

Decronym@lemmy.decronym.xyz on 21 Apr 07:15 collapse

Acronyms, initialisms, abbreviations, contractions, and other phrases which expand to something larger, that I’ve seen in this thread:

Fewer Letters More Letters
IP Internet Protocol
PoE Power over Ethernet
VPN Virtual Private Network

3 acronyms in this thread; the most compressed thread commented on today has 4 acronyms.

[Thread #694 for this sub, first seen 21st Apr 2024, 07:15] [FAQ] [Full list] [Contact] [Source code]