This commit is contained in:
SechPoint 2026-03-13 11:36:51 +00:00
parent 9983722428
commit 7b16a8c482
2 changed files with 25 additions and 22 deletions

View file

@ -4,19 +4,10 @@ This repository contains automated scripts to deploy the Wallarm Filtering Node
**Repository:** `https://git.sechpoint.app/customer-engineering/wallarm`
---
## 🚦 Step 1: Mandatory Pre-Flight Diagnostic
Before attempting any installation, you **must** verify the environment. Banks often have strict egress filters. This script verifies sudo access, required tools, and connectivity to Wallarm Cloud IPs.
**Run the interactive diagnostic:**
## Download and run the Deployment Script
### for Container (Docker) deployments:
```bash
# Download and run the pre-flight test
curl -sL "[https://git.sechpoint.app/customer-engineering/wallarm/-/raw/main/pre-deployment-test.sh](https://git.sechpoint.app/customer-engineering/wallarm/-/raw/main/pre-deployment-test.sh)" -o pre-deployment-test.sh
chmod +x pre-deployment-test.sh
./pre-deployment-test.sh
curl -sL "https://git.sechpoint.app/customer-engineering/wallarm/-/raw/main/wallarm-deploy-ct.sh" > wallarm-deploy-ct.sh
chmod +x wallarm-deploy-ct.sh
./wallarm-deploy-ct.sh
```

View file

@ -191,11 +191,12 @@ EOF
fi
}
# --- 5. VERIFICATION ---
# --- 5. VERIFICATION & ATTACK TEST ---
verify_health() {
echo -e "\n${YELLOW}⏳ Waiting 15s for handshake...${NC}"
sleep 15
echo -e "\n${YELLOW}⏳ Waiting 20s for handshake and sync...${NC}"
sleep 20
echo -en "Checking instance status page (port $MONITOR_PORT)... "
if curl -s "http://localhost:$MONITOR_PORT/wallarm-status" | grep -q "requests"; then
echo -e "${GREEN}SUCCESS${NC}"
@ -204,14 +205,25 @@ verify_health() {
echo -e "Check logs with: sudo $ENGINE logs $NODE_NAME"
fi
echo -e "\n${YELLOW}⚔️ Running Attack Test (SQLi & XSS)...${NC}"
# Test 1: SQL Injection
echo -n "Sending SQLi payload to port $TRAFFIC_PORT... "
local sqli_res=$(curl -s -o /dev/null -w "%{http_code}" "http://localhost:$TRAFFIC_PORT/?id='OR+1=1+UNION+SELECT+1,2,3--")
echo -e "HTTP Status: $sqli_res (Logged)"
# Test 2: XSS
echo -n "Sending XSS payload to port $TRAFFIC_PORT... "
local xss_res=$(curl -s -o /dev/null -w "%{http_code}" "http://localhost:$TRAFFIC_PORT/?search=<script>alert('Wallarm_Test')</script>")
echo -e "HTTP Status: $xss_res (Logged)"
echo -e "\n${GREEN}✅ DEPLOYMENT FINISHED${NC}"
echo -e "--------------------------------------------------"
echo -e "Instance ID: $INSTANCE_NUM"
echo -e "Directory: $INSTANCE_DIR"
echo -e "Container Name: $NODE_NAME"
echo -e "Traffic Port: $TRAFFIC_PORT (Forwarded to $UPSTREAM_IP:$UPSTREAM_PORT)"
echo -e "Traffic Port: $TRAFFIC_PORT"
echo -e "Monitor Port: $MONITOR_PORT"
echo -e "Log File: $LOG_FILE"
echo -e "\nCheck your Wallarm Console ($CLOUD_SEL Cloud) now."
echo -e "The attacks should appear in the 'Events' section within 1-2 minutes."
echo -e "--------------------------------------------------"
}