-
Notifications
You must be signed in to change notification settings - Fork 73
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
How to do Authentication(Either with Credentials/Session Cookie) using rekono #48
Comments
I'm not sure if I'm understanding you regarding to credentials or session cookies. For authentication in Rekono, you can use the session in the frontend or your API token to make requests directly to the API REST. You can get your API key in your profile after input your password. Moreover, to use the API REST, you can also use the rekono-cli project. About the tools errors, there aren't due to lack of authentication. The reason of these errors are very differents:
I don't know if I can help you in anything else, but in general, this errors seems to belong to the external hacking tools or due to the specific target that you are scanning |
Sorry, I finally understand this issue after read again your description. No, at the moment is not possible to execute hacking tools using authentication against the target services. I know that it's a very interesting and needed feature, and I have included it to the backlog yet, even before make Rekono public. I will keep this issue open to keep it in mind :) |
@pablosnt ok I mainly wanted this is because my Server is configured with authentication, inorder for these tools to login to my Server and run scan/attack, somewhere there should be a way to configure either authentication(basic/form port/ntlm) or cookie based session ids. |
Yes, of course, it's a feature that Rekono should include but it can't be implemented yet. This development can need some time, because it can be complex, includes frontend and backend development and a lot of authentication methods should be considered. As fast and very bad workaround, you can configure manually your tools in your database to use this authentication tokens or credentials, or you can create specific tool configurations to use these authentication. Of course, this workaround would apply the authentication configuration for all your targets and projects. I'm referring to this: https://github.com/pablosnt/rekono/blob/main/rekono/tools/fixtures/3_configurations.json#L248. As I said, it's a very bad workaround, but it could work for you while the feature is not released |
@pablosnt I am fine with bad workaround, all I need is to use those subset of tools in your main tool. Based on the code you referred above, are you saying to change the 3_configurations.json file in my local code outside docker container as below(in this case considering ZAP tool for now):
Once above code is added, I have to rebuild with no-cache and bring up the containers to make the above code reflected in the container. |
Yes, this file is the default data in the Rekono database. So, if you have a Rekono instance up, you also can change this value directly in the Configuration table of the Rekono database. If you change the value in the file, you need to re-deploy the full environment, because it's needed to initialize the database again |
ok I see.. Also should I need to figure out what is the arguments I have to give as per the cli of the Tool or I can simply give like this: |
I did quick search on zap command line, I found below two links:
Need to research on -config option to pass cookie... Seems like for every tool I have to find the command line option and add it to 3_configurations.json file for "arguments". Thanks |
I see following containers, in which container(name of the container would be helpful) I can directly change the file so that I need not rebuild the code.
|
No, I think that I didn't explain myself. You have two options: edit the file in your system and build the environment again or edit the Rekono database directly. The Rekono database is the postgres container, where you can access the Configuration table in the "rekono" database using the credentials "postgres:postgres" (if you didn't change it) |
Sure @pablosnt the table name in postgres would be tools_configuration and below is the commands of postgres which need to be run:
will use this as a workaround. Thanks |
Released in the latest release 1.4.0 |
What do you need?
Is there way we can use credentials or session cookies to login and run all the Tools in Rekono to Test the Device Under Test
Below are some error seen due to lack of authentication:
Tool: Log4j Scanner
Tool: ZAP
Tool: CMSeek
Tool: SearchSploit
The text was updated successfully, but these errors were encountered: