Sponsored
Vulnerability Scanner

ThreatMapper – Deepfence Cloud Native Workload Protection Tool

Hey Folks, in this tutorial, we have brought a system protection tool for you, which is called “ThreatMapper“. The Deepfence Runtime Threat Mapper is a subset of the Deepfence cloud native workload protection platform, released as a community edition. You can read about this tool completely from here.

Let’s take a look 😛 !!

Install Docker

To install this tool in any server or system, we must first install the docker. Installing Docker anywhere is not a difficult task as you can easily install it using the following command.

apt install docker.io docker-compose

Installation of Threat Mapper

Like every time, this time also we have to download the community edition of this tool from github using the git clone command. Once downloaded, we go to the directory of tool named “file” and execute the docker command to run the multi-container docker applications at the same time.

git clone https://github.com/deepfence/ThreatMapper.git
cd ThreatMapper/
cd files/
docker-compose -f docker-compose.yml up -d

Hmm 😛 !! Suppose if the command executes, but the application does not start then in that case you can check all the activated application by using the “ps” command.

docker ps

Alright 😛 !! Now we forcefully open our local address with “https” on the browser. We do not already have an account, so we have to register ourselves first.

https://localhost

Now we have to enter some necessary details to create a new account.

Topologies

Good 😛 !! Once the account is created, we redirect to the management console of this tool. The interface of this tool is beautiful and easy that anyone can control easily. In the topology section of this tool, we find all the devices connected to this network.

OK 😛 !! You can choose any host according to you but in our case we will select our machine and start a vulnerability scan on it. It will take a long time to detect all types of vulnerabilities in the host machine.

Vulnerabilities Detect

After the scanning is complete, you can find all the details by going to the vulnerability section of this tool. As you can see in the image below it describes all vulnerabilities according to the risk situation.

We just go down a bit and get more clarity on the results.

As you can see all the vulnerabilities have been described with CVE which can give developers the benefit of fixing these errors.

Nice 😛 !! We can get deep knowledge of any vulnerability by clicking on it.

Opps 😛 !! We have highlighted some features that we could not access due to not have premium version but you can buy it according to yourself and easily audit any system.

About the Author
Shubham Goyal Certified Ethical Hacker, information security analyst, penetration tester and researcher. Can be Contact on Linkedin.
Sponsored

Recent Posts

Termux Cheat Sheet for Hackers

Hey Folks :) !! In this article, we present the "Termux Cheat Sheet for Hackers"…

1 month ago

Cracking the X-Factor in Cybersecurity: How Humans are Protecting the Systems?

Amid the rapid advancement of technology, the significance of human involvement in cybersecurity frequently goes…

8 months ago

Cariddi – Hidden Endpoint Finder for Bug Hunting

Hey Folks, we are back today after such a long break, but don't worry we…

2 years ago

API Security Testing 101: Know Everything About API Security Testing!

The security of your API should be one of the top priorities of companies. Without…

2 years ago

7 Best Tools for Web Penetration Testing: Comprehensive Details

Hey Folks, In today's business world, it is essential to have an online presence. However,…

2 years ago

Cyber Security Audits: Everything You Need to Know About It

Hey Folks, Is your business prepared in case of a cyber attack? Many companies don't…

2 years ago
Sponsored

This website uses cookies.