Quick Start

Currently, only Docker Compose based deployment is supported.

Using Docker Compose

To start Artemis, clone the https://github.com/CERT-Polska/Artemis/ repository and execute the following 2 commands in your terminal in the Artemis directory:

cp env.example .env  # you may also configure the settings (e.g. by providing a User-Agent to override the default one)
docker compose up --build

After that you should be able to access the Artemis dashboard at localhost:5000.

Note

Artemis exposes port 5000 that can be used to add tasks and view results. Remember that this port shouldn’t be available publicly, but e.g. on an internal network.

To add authorization (or SSL termination), you may for example use a reverse proxy, e.g. nginx.

We recommend you to add additional Artemis modules from https://github.com/CERT-Polska/Artemis-modules-extra/ - these modules haven’t been included in core due to licensing reasons, but provide additional features such as e.g. SSL verification (certificate validity, proper redirect, etc.), subdomain takeover check or SQL injection check.

To do that, clone https://github.com/CERT-Polska/Artemis-modules-extra/ inside the Artemis directory and use:

docker compose -f docker-compose.yaml -f Artemis-modules-extra/docker-compose.yml up --build

If you want to start multiple instances of a module to speed up scanning, use a command such as:

docker compose -f docker-compose.yaml -f Artemis-modules-extra/docker-compose.yml up --build \
     --scale=karton-nuclei=10 \
     --scale=karton-bruter=10 \
     --scale=karton-port_scanner=10

For the full list of available configuration options you may set in the .env file, see Configuration options.

Note

If you get an error that docker compose is not a valid command, that means that Docker Compose plugin is not installed. Please follow the instructions from https://docs.docker.com/compose/install/linux/#install-using-the-repository

The old docker-compose syntax is not recommended.

Adding targets to scan

To add targets to be scanned, select Add targets from the top navigation bar. Artemis takes input in the form of entries separated with newlines. Artemis works with both IPs and domains. It also supports IP ranges, both in the form of 127.0.0.1-127.0.0.10 or 127.0.0.0/30.

If a URL is provided, the host from this URL will be scanned.

To be later able to filter various types of targets, provide a tag in the Tag field. You may also choose what modules will be executed, to increase scanning speed if you need only to check for a subset of vulnerabilities.

_images/adding-targets.png

Viewing results

To view results, click the View results link in the top navigation bar:

_images/viewing-results.png

Exporting reports

Besides viewing the raw results, you may want to generate HTML reports containing descriptions of found vulnerabilities, so thay you can notify the administrators to get the vulnerabilities fixed.

To do that, please refer to Generating reports to be sent.