Support
Getting Started

Installing Invicti Hawk internally

This document is for:
Invicti Standard, Invicti Enterprise On-Premises

Hawk is the infrastructure the Invicti web application security scanner uses to detect Server Side Request Forgery (SSRF), and all other kinds of blind, asynchronous and second order vulnerabilities that require data to be sent over out-of-band channels.

This topic explains how to host Invicti Hawk infrastructure in your environment.

For further information, see How Invicti Hawk Finds Vulnerabilities.

Requirements

These are the minimum requirements for the machines on which you install Invicti Hawk:

  • Docker must be installed
  • SSL/TLS certificate ready in .pem format for <DOMAIN_NAME>
  • Recommended RAM: 4 GB
  • Recommended disk: 100 GB (mostly for logging purposes)

How to install Invicti Hawk internally

  1. Make sure you have a Static IP address to allocate to the DNS Server, which will be referred to as <STATIC_IP> in these steps.
  2. Register a short DNS Address, which will be referred to as <DOMAIN_NAME>& or example.com in this document.
  3. Register ns.<DOMAIN_NAME> and ns2.<DOMAIN_NAME> as Name Servers for <DOMAIN_NAME>.
  4. Point ns.<DOMAIN_NAME> and ns2.<DOMAIN_NAME> to <STATIC_IP>. The Name Server will be hosted inside the Docker Container.
  5. Please make sure that the following Hawk ports are reachable and not used by any other process:
    • TCP 80, 53, 443; from everywhere
    • UDP 53; from everywhere
  6. Download the latest compressed Invicti Hawk Docker image file and copy it to a machine with a Docker installation. You can download it from this link: https://s3.amazonaws.com/ns.hawk/netsparkerhawk.tar.gz
  7. Load this image to Docker using the following command:
docker load < netsparkerhawk.tar.gz
  1. Create a container using the following command. Adjust the command, by inserting your own domain name (<DOMAIN NAME> and static IP (<STATIC IP>).
docker create -it -e DOMAIN_NAME='<DOMAIN_NAME>' -e STATIC_IP='<STATIC_IP>' -e RESPONDER_HTTP_ONLY='NO' --security-opt=no-new-privileges --restart=always --oom-kill-disable --memory=3g -p 80:5080 -p 443:50443 -p 53:5053/udp --name netsparkerhawk netsparkerhawk
  1. To restrict IP addresses based on your requirements, run this: docker cp config.yml netsparkerhawk:/opt/gopath/src/hawk/conf/config.yml
    (You can find the config.yml in the dockerfile. Here is the sample:
    allowedListMode : true
    allowedList:
    - 54.85.169.114
    - 54.88.149.100
    - 3.122.90.89 )
  2. We recommend that you have SSL/TLS support between Invicti and Hawk. If your certificates are in .crt and .key file formats, they should be converted to .pem files (see https://stackoverflow.com/search?q=crt+key+pem).
    • Copy your certificate and private key into the cert folder in the Hawk container
    • docker cp fullchain.pem netsparkerhawk:/opt/cert/fullchain.pem
    • docker cp privkey.pem netsparkerhawk:/opt/cert/privkey.pem
    • If you do not wish to use HTTPS, e.g. for testing purposes, pass the RESPONDER_HTTP_ONLY='YES' argument to the docker create command.
  3. Start the container:
    • docker start netsparkerhawk
  4. Configure DNS for <DOMAIN_NAME>, as in example.com:
    • Define two name servers ns.example.com and ns2.example.com to point to the static IP address of the docker host
    • Check that the docker host machine is accessible using these DNS names
    • Invicti Hawk should be able to resolve the following addresses:
      • example.com
      • ns.example.com
      • ns2.example.com
      • a.example.com
      • a.b.c.example.com
      • aaaaaaaaaaaaaaaaaaaaaaa.example.com
  5. Change Invicti Hawk URI in the policy to https://example.com or http://example.com if you do not want to use HTTPS.
  1. Validate DNS Settings and Invicti Hawk.
  1. You can now run Invicti scans using a custom server that uses this policy for the Hawk verification.

Invicti Help Center

Our Support team is ready to provide you with technical help.

Go to Help Center This will redirect you to the ticketing system.