Hey Folks, in this tutorial, we have brought a system protection tool for you, which is called “ThreatMapper“. The Deepfence Runtime Threat Mapper is a subset of the Deepfence cloud native workload protection platform, released as a community edition. You can read about this tool completely from here.
Let’s take a look 😛 !!
To install this tool in any server or system, we must first install the docker. Installing Docker anywhere is not a difficult task as you can easily install it using the following command.
apt install docker.io docker-compose
Like every time, this time also we have to download the community edition of this tool from github using the git clone command. Once downloaded, we go to the directory of tool named “file” and execute the docker command to run the multi-container docker applications at the same time.
git clone https://github.com/deepfence/ThreatMapper.git
cd ThreatMapper/
cd files/
docker-compose -f docker-compose.yml up -d
Hmm 😛 !! Suppose if the command executes, but the application does not start then in that case you can check all the activated application by using the “ps” command.
docker ps
Alright 😛 !! Now we forcefully open our local address with “https” on the browser. We do not already have an account, so we have to register ourselves first.
https://localhost
Now we have to enter some necessary details to create a new account.
Good 😛 !! Once the account is created, we redirect to the management console of this tool. The interface of this tool is beautiful and easy that anyone can control easily. In the topology section of this tool, we find all the devices connected to this network.
OK 😛 !! You can choose any host according to you but in our case we will select our machine and start a vulnerability scan on it. It will take a long time to detect all types of vulnerabilities in the host machine.
After the scanning is complete, you can find all the details by going to the vulnerability section of this tool. As you can see in the image below it describes all vulnerabilities according to the risk situation.
We just go down a bit and get more clarity on the results.
As you can see all the vulnerabilities have been described with CVE which can give developers the benefit of fixing these errors.
Nice 😛 !! We can get deep knowledge of any vulnerability by clicking on it.
Opps 😛 !! We have highlighted some features that we could not access due to not have premium version but you can buy it according to yourself and easily audit any system.
A keen learner and passionate IT student. He has done Web designing, CCNA, RedHat, Ethical hacking, Network & web penetration testing. Currently, he is completing his graduation and learning about Red teaming, CTF challenges & Blue teaming.
The gau (Get All URLs) tool is a versatile open-source utility that collects URLs from…
Jsluice++ is a Burp Suite extension designed for passive and active scanning of JavaScript traffic…
Hey Folks :) !! In this tutorial, we will describe some of the techniques commonly…
Hey Folks :) !! In this article, we present the "Termux Cheat Sheet for Hackers"…
Amid the rapid advancement of technology, the significance of human involvement in cybersecurity frequently goes…
Hey Folks, we are back today after such a long break, but don't worry we…
This website uses cookies.