Nightingale - Docker Environment For Pentesting Which Having All The Required Tool For VAPT

2 years ago 172
BOOK THIS SPACE FOR AD
ARTICLE AD

In today's technological era, docker is the most powerful technology in each and every domain, whether it is Development, cyber security, DevOps, Automation, or Infrastructure.

Considering the demand of the industry, I would like to introduce my idea to create a NIGHTINGALE: docker image for pentesters.

This docker image is ready to use environment will the required tools that are needed at the time of pentesting on any of the scopes, whether it can be web application penetration testing, network penetration testing, mobile, API, OSINT, or Forensics.

The best part is you can either create an altered docker image or pull the pre-built docker image from the hub.

Some of the best features are listed below, I would highly recommend going through it and starting penetrating into the application. Link to access tool list : tool list

Pros

No need to install multiple programming language support and multiple modules. Booting process is very fast as per the virtualization concept. Need as per use resource of the host machine. All pre-install tools are installed and if you install any new software or tool use can go with that option. You can perform vulnerability assessment and penetration testing of any scope. You can access this docker container via browser by calling your local address.

Cons

You can run the container over cloud server but can’t perform mobile pentesting. Creating tunnel with SSH can’t help you to provide the connection to your physical device or virtual environment.

Why?

The Reason behind creating this Docker file is to make a platform-independent penetration toolkit. It includes all the useful tools that will be required for a penetration tester (You can refer to the tool list section for the same).

Architecture Diagram of the NIGHTINGALE.

Diagram

Docker Image Build and Run

Take a clone of the repository
git clone --depth 1 https://github.com/RAJANAGORI/Nightingale.git
Change the Directory Now build the Docker Image.
docker build -t rajanagori/nightingale .
After Creating the Docker Image, Login into the image and Happy Hacking.... ;-)
docker run -ti --hostname nightingale rajanagori/nightingale /bin/bash
Now, you can directly access Nightingale interactive terminal using the browser
docker run -it -p 0.0.0.0:8080:7681 -d rajanagori/nightingale /home/binaries/ttyd -p 7681 bash
If you want to run MobSF along with the nightingale then I will give you good news now you can do the same....!!

part 1

docker run -it -p 0.0.0.0:8080:7681 -p 0.0.0.0:8081:8081 -d rajanagori/nightingale /home/binaries/ttyd -p 7681 bash

part 2

cd /home/tools_mobile_vapt/Mobile-Security-Framework-MobSF/
source venv/bin/activate
./run 0.0.0.0:8081 &

Call your browser and hit 127.0.0.1:8080 for the nightingale terminal and 127.0.0.1:8081 for MobFs to become you will be prooo!!!!

If you want to bind your host machine directory to your container directory then you can do the same.

docker run -it -p 0.0.0.0:8080:7681 -p 0.0.0.0:8081:8081 -v /<your_host_machine_directory_path>:/<your_container_directory_path> -d rajanagori/nightingale /home/binaries/ttyd -p 7681 bash

For Localtunnel

Hit 127.0.0.1:8080 in your browser and you will be able to access the Nightingale terminal Now, run the following command in your terminal
nvm install v16.14.0 && npm install -g localtunnel

and hit this command

lt --port 7681 --subdomain nightingale

Now, Click on the link generated and have fun with Nightingale !!!

To start, Restart and Stop the Postgresql database

To start the service To Restart the service
service postgresql restart
To Stop the service

Note: Use of Postgresql is for msfConsole.

Please feel free to contribute to the tool

Nightingale - Docker Environment For Pentesting Which Having All The Required Tool For VAPT Nightingale - Docker Environment For Pentesting Which Having All The Required Tool For VAPT Reviewed by Zion3R on 8:30 AM Rating: 5

Read Entire Article