|
4 周前 | |
---|---|---|
.. | ||
Dockerfile | 4 周前 | |
README.md | 4 周前 | |
docker-compose.yml | 4 周前 | |
entrypoint.sh | 4 周前 |
This is a side module for a broader project focused on network vulnerability scanning. It enables remote scanning by establishing a reverse VPN tunnel between the remote client and the central scanner.
The containerized WireGuard client connects securely to the main scanner’s server, making the remote network accessible for scanning — as if the scanner were directly connected to it.
network_mode: host
to provide full LAN visibilitydocker-compose.yml
Edit the environment section and replace placeholders with actual values:
WG_ADDRESS: "10.0.0.2/24"
WG_SERVER_PUBLIC_KEY: "YOUR_REAL_PUBLIC_KEY_HERE"
WG_SERVER_ENDPOINT: "YOUR.SERVER.IP.HERE:51820"
WG_ALLOWED_IPS: "0.0.0.0/0"
WG_KEEPALIVE: "25"
WG_IFACE: "enp0s3" # Replace with your actual network interface
sudo docker-compose build
sudo docker-compose up -d
sudo docker logs wireguard-client
You should see:
The public key of the client
Confirmation of the wg0 interface being created
No config syntax errors