updated interactive option explanation in deployment readme

This commit is contained in:
daniel_sagi
2018-07-18 19:49:49 +03:00
parent 45ab93fc26
commit d40ea94840

View File

@@ -6,7 +6,8 @@ We welcome contributions, especially new hunter modules that perform additional
## Hunting
By default, without any special flags, Kube Hunter will scan all of your machine's network interfaces for open Kubernetes services.
By default, without any special flags, Kube Hunter will open an interactive session, in which you will be able to select one of its scan options.
If you want to specify the scan option manually, form the command line. these are your options:
To specify a specific cidr to scan, use the `--cidr` option. Example:
`./kube-hunter.py --cidr 192.168.0.0/24`
@@ -14,6 +15,10 @@ To specify a specific cidr to scan, use the `--cidr` option. Example:
To specify remote machines for hunting, you can use the `--remote` option. Example:
`./kube-hunter.py --remote some.node.com`
To specify internal scanning, you can use the `--internal` option. (this will scan all of the machine's network interfaces) Example:
`./kube-hunter.py --internal`
### Active Hunting
Active hunting is an option in which Kube Hunter will exploit vulnerabilities it finds, in order to explore for further vulnerabilities.