mirror of
https://github.com/aquasecurity/kube-hunter.git
synced 2026-05-21 16:45:05 +00:00
updated interactive option explanation in deployment readme
This commit is contained in:
@@ -6,7 +6,8 @@ We welcome contributions, especially new hunter modules that perform additional
|
||||
|
||||
## Hunting
|
||||
|
||||
By default, without any special flags, Kube Hunter will scan all of your machine's network interfaces for open Kubernetes services.
|
||||
By default, without any special flags, Kube Hunter will open an interactive session, in which you will be able to select one of its scan options.
|
||||
If you want to specify the scan option manually, form the command line. these are your options:
|
||||
|
||||
To specify a specific cidr to scan, use the `--cidr` option. Example:
|
||||
`./kube-hunter.py --cidr 192.168.0.0/24`
|
||||
@@ -14,6 +15,10 @@ To specify a specific cidr to scan, use the `--cidr` option. Example:
|
||||
To specify remote machines for hunting, you can use the `--remote` option. Example:
|
||||
`./kube-hunter.py --remote some.node.com`
|
||||
|
||||
To specify internal scanning, you can use the `--internal` option. (this will scan all of the machine's network interfaces) Example:
|
||||
`./kube-hunter.py --internal`
|
||||
|
||||
|
||||
### Active Hunting
|
||||
|
||||
Active hunting is an option in which Kube Hunter will exploit vulnerabilities it finds, in order to explore for further vulnerabilities.
|
||||
|
||||
Reference in New Issue
Block a user