- Access the engine http://your-docker-host:8080/
- Choose your admin credentials.
- Access the engine http://your-docker-host:8080/
- Access the admin login from the dropdown menu behind the 🏠 in the top right corner
- Use the following credentials for your first login:
Username: choosen Username
Password: choosen Password
- You are now logged in. Additional users can be created in the user managment section. New users are created without any permissions by default. They are not even permitted to log in. This can be changed by assigning them to the pre-exsisting groups or by granting them the required permission individually.
- After logging in via http://your-docker-host:8080/, the welcome screen will be displayed. From here you can start the different Camunda Web Apps.
Cockpitis used for monitoring running and ended process instances.Adminis used for managing users, groups and authorizations.Tasklistis used for user tasks and starting processes.
- Click on
Tasklistto see the list of open tasks.
- Next select
Start processto open the list of available processes.
- Choose the desired scan process to display the form for configuring the scan. In this example
Nmap Port Scanhas been used.
- Finally, start the scan process by clicking
Start.
Note: A more detailed guide for the Camunda UI can be found here.
The secureCodeBox can save the security tests results into different data stores. A list with all availible stores and how to configure and use them can be found here.
When a scan is started via the Camunda UI, the scan is considered to be a manual scans. This means that its results has to be confirmed before they it gets persisted by the configured persistence provider (e.g. elasticsearch). The results will show up in the tasklist and will get persistet once their the task has been marked as completed.
When a scan is started via the REST-API, the scan is considered to be automated. This means that the results will get automatically persisted into the configured perssitence provider (e.g. elasticsearch). The results of the securityTest will however not show up in the tasklist. The securityTest will be completed directly and the results are only availible via the persistence provider or by accessing it via the Rest-API.
In order to start a scan via the REST-API, send a PUT-Request to the following URL:
<<Engine_Address>>/box/securityTests.
The scanning target is set within the payload. A securityTest running a nmap port scan woud look like this:
[
{
"name": "nmap",
"context": "Feature Team 1",
"target": {
"name": "example.com website",
"location": "example.com",
"attributes": {
"NMAP_PARAMETER": "-Pn"
}
}
}
]You can check out a more detailed API documentation in the Swagger Docs of the secureCodeBox Engine. The Swagger Docs come together with the secureCodeBox Engine. You can access it at <<Engine_Address>>/swagger-ui.html. If you dont have one running yet you can look at the staticly exported version of it here: Static API Docs
MetaFields can be used to tag security tests with custom data relevant for you. We have encountered some data values which we found paticulary usefull and standardized their format to be used in multiple places. The list and formats can be found here.
MetaFields can currently only be set via the rest api. See the swagger docs for how to set them.
The following links contain completes examples and explanations how to set up and start scans against demo application.
- Scanning modern Single Page Applications like OWASP Juice Shop using Arachni
- Scanning Server Rendered Applications like BodgeIt Store using Arachni
- Scanning Server Rendered Applications like BodgeIt Store using OWASP ZAP
We have introduced a simple secureCodeBox CLI which is based on the REST-API. This CLI can be used to configure and start Scan-Process or to integrate with you CI/CD Pipeline (e.g. Jenkins).
When using the secureCodeBox in multiple independent teams all managing their own infrastructure you can run into numerous problems, from isolated services only availible in specific networks to aggresive firewalls blocking any automated scans. The secureCodeBox is designed to handle these situations.
See the Multi Tenancy Docs and Example






