Patrowl Manager

Step by step Installation & configuration

Patrowl Manager is an agentless open-source vulnerability scanner that helps CIOs/CIOs keep an eye on the vulnerabilities in their infrastructure.

sudo yum install -y yum-utils

sudo yum-config-manager \

    –add-repo \

https://download.docker.com/linux/centos/docker-ce.repo

sudo yum-config-manager –enable docker-ce-nightly

sudo yum install docker-ce docker-ce-cli containerd.io

sudo systemctl start docker

sudo docker run hello-world

INSTALL AS A CONTAINER Docker composer

sudo curl -L “https://github.com/docker/compose/releases/download/1.27.2/docker-compose-$(uname -s)-$(uname -m)” -o /usr/local/bin/docker-compose

sudo chmod +x /usr/local/bin/docker-compose

docker-compose –version

sudo ln -s /usr/local/bin/docker-compose /usr/bin/docker-compose

Patrol Manger

https://docs.docker.com/engine/install/centos/

INSTALL GIT

Sudo yum install git

git clone https://github.com/Patrowl/PatrowlManager.git

cd Patrowl Manager

docker-compose build –force-rm

docker-compose up

Disable Firewall If it’s feasible or open the ports

firewall-cmd –zone=public –add-port=8083/tcp –permanent

sudo firewall-cmd –reload

http://localhost:8083/
and sign in with default admin credentials : admin/Bonjour1!

Patrol Engines

git clone https://github.com/Patrowl/PatrowlEngines.git

cd PatrowlEngines

To enable the configuration file rename .json.samble file to .jason in all engines folder

cp arachni/arachni.json.sample arachni/arachni.json

 cp censys/censys.json.sample censys/censys.json

 cp certstream/certstream.json.sample certstream/certstream.json

 cp cortex/cortex.json.sample cortex/cortex.json

 cp eyewitness/eyewitness.json.sample eyewitness/eyewitness.json

 cp nessus/nessus.json.sample nessus/nessus.json

 cp nmap/nmap.json.sample nmap/nmap.json

 cp openvas/openvas.json.sample openvas/openvas.json

 cp owl_code/owl_code.json.sample owl_code/owl_code

 cp owl_dns/owl_dns.json.sample owl_dns/owl_dns.json

 cp owl_leaks/owl_leaks.json.sample owl_leaks/owl_leaks.json

 cp owl_request/owl_request.json.sample owl_request/owl_request.json

 cp pastebin_monitor/pastebin_monitor.json.sample pastebin_monitor/pastebin_monitor.json

 cp ssllabs/ssllabs.json.sample ssllabs/ssllabs.json

 cp sslscan/sslscan.json.sample sslscan/sslscan.json

 cp urlvoid/urlvoid.json.sample urlvoid/urlvoid.json

 cp virustotal/virustotal.json.sample virustotal/virustotal.json

 sudo scripts/build-docker-engines.sh

 sudo scripts/start-docker-engines.sh

Disable Firewall If it’s feasible or open the ports of mentioned ports

If you want to open individually Ports are mentioned in output of the command

sudo firewallcmd –zone=public –permanent –add-port=5001-5021/udp

firewall-cmd –reload

Click on Engines and add scan engine instance

Add a engine the give a name

API URL: http:// Host IP:5001/engines/nmap/

Click on create a new engine

Add all Engines Respectively.

For adding asset or subnet click on Asset then click on add new asset

Give IP or subnet And name

Select type as subnet or ip respectively and create new asset

For adding scan 

Click on scan and add new scan

Give 

Title 

Description

Select asset in search the asset

Then select the engine and policy

Click on Create new scan to create the scan

To run the scan click on scans and scan definition.

Run the created scan

Leave a Reply

Your email address will not be published. Required fields are marked *