From d40ea94840be3bc8416b4c1f755dd72a8101a1f4 Mon Sep 17 00:00:00 2001 From: daniel_sagi Date: Wed, 18 Jul 2018 19:49:49 +0300 Subject: [PATCH] updated interactive option explanation in deployment readme --- README.md | 7 ++++++- 1 file changed, 6 insertions(+), 1 deletion(-) diff --git a/README.md b/README.md index e8127c3..075a96e 100644 --- a/README.md +++ b/README.md @@ -6,7 +6,8 @@ We welcome contributions, especially new hunter modules that perform additional ## Hunting -By default, without any special flags, Kube Hunter will scan all of your machine's network interfaces for open Kubernetes services. +By default, without any special flags, Kube Hunter will open an interactive session, in which you will be able to select one of its scan options. +If you want to specify the scan option manually, form the command line. these are your options: To specify a specific cidr to scan, use the `--cidr` option. Example: `./kube-hunter.py --cidr 192.168.0.0/24` @@ -14,6 +15,10 @@ To specify a specific cidr to scan, use the `--cidr` option. Example: To specify remote machines for hunting, you can use the `--remote` option. Example: `./kube-hunter.py --remote some.node.com` +To specify internal scanning, you can use the `--internal` option. (this will scan all of the machine's network interfaces) Example: +`./kube-hunter.py --internal` + + ### Active Hunting Active hunting is an option in which Kube Hunter will exploit vulnerabilities it finds, in order to explore for further vulnerabilities.