Initializing the Repeater
This command initializes the Repeater mode: bright-cli repeater [options]
.
The Repeater mode enables you to run discoveries or scans on a local target, without exposing it to the internet.
The Repeater mode is part of Bright CLI. If you have already connected a Repeater, you cannot connect the same Repeater (with the same ID) with a different CLI version. In this case, you first need to install the latest version of the Bright CLI and then proceed to the connection.
For more details about the Repeater mode, see Repeater (Scan Proxy).
Important:The Repeater mode requires a working
AUTH_TOKEN
with the scopebot
.
Options
Option | Description |
---|---|
| The ID of an existing Repeater that you want to use. |
| The token (API key) to use, either a User Key, a Project Key or an Organization Key. Required option. |
| Extra headers to be passed with each request. Also, it can be used to remove a header by providing a name without content. For example, Warning: Headers set with this option override the original headers and are set in all requests. |
| Time to wait for a server to send response headers (and start the response body) before aborting the request. Default: 30000 ms |
| File path to write logs to. If specified, logs will be written to this file Default: User home directory Extra optional params when
|
| Initializes the Repeater as a local daemon service. Note: If you run this command while a service is already running, it will first stop and delete the running service and then restart it with the new repeater settings. |
| Stops and deletes the running repeater service. |
| Loads scripts to the Repeater from a JSON of Note: Wildcards are also supported, for example: If you have loaded a local script to the Repeater using this CLI command, loading remote scripts from the Bright App is disabled automatically. See Repeater Scripts for more information about how the Repeater Scripts work. |
| You may require to authorize Bright to your network server by providing valid TLS/SSL certificates. This option allows you to load a file with multiple CA certificates to the Repeater that you use for the scan, for example: You can load certificates from the “Trusted Root Certification Authorities Certificate Store” (Windows only): The Bright CLI also supports autodiscovery from the following files: Important: Currently, the Bright’s insecure TLS configuration test is limited to cloud-based scans and is not available for scans run in the Repeater mode. In this case, you need to manually check if the ciphers and encryption applied to the TLS certificates are strong enough, to ensure a high level of security of your application. To simplify the check, you can use open-source TLS/SSL testers, for example: https://github.com/drwetter/testssl.sh Default: Neither of the tools requires installation or an internet connection. |
| Certificate Configuration Multiple Certificates Support Certificate Configuration Format Wildcard Support Format Single Certificate Multiple Certificates for Different Ports Multiple Certificates for Different Hosts |
| Configure experimental support for TCP connections reuse. |
Updated 1 day ago