In this post, I am going to show you an easy way to execute Penertration testing in your network for free in 30 days.

Just using one command auto-generated from ‘s Nodezero platform, you will be able to execute a professional pen testing to reveal some proven attack paths in your network, and find out weakness imapct to your organizaiton.



First, register a free account for 30 days trial in

To run an internal pentest, you must first setup a NodeZero Host. A NodeZero Host is a system within your network where you deploy NodeZero for each pentest. You can configure an existing system or use our purpose-built OVA.

NodeZero is a Docker container that acts as a beachhead inside your network. It receives and executes pentesting instructions from Horizon3’s Command and Control Server running in the Horizon3 cloud.

After configuring a pentest using this wizard, you’ll receive a custom NodeZero Launch Script command that must be executed on your NodeZero Host. The launch script deploys NodeZero and begins the pentest.

What do I do after configuring my pentest?

After configuring your pentest, copy the NodeZero Launch Script and deploy on your Docker Host.

NodeZero acts as a ‘beachhead’ within your network. It receives instructions from Horizon3’s Command and Control Server and scans your network for weaknesses, using the same tools and tactics as a real-world attacker.

Prepare Your Nodezero node (Linux VM)

Install a linux OS on the virtual machine. The minimum system hardware requirements for your virtual machine :
  • 2 vCPU
  • 4GB RAM
  • 20 GB Free hard drive space
Here we are using Ubuntu system as an example. Execute following two commands to install docker after you installed Ubuntu OS:
  • apt update -y && apt upgrade -y
  • apt install docker

Steps to generate one line command to launch Pen Testing

After you registered an account in, you should be able to log in to use the service for free in 30 days. 

1 Run Pentest and select Internal Pentest

2 Enter your network infomation for Pentest Scope

3 Customize your Attack Configuration

Review custom pentest settings before get the code:

4 Deploy the code:

Launch NodeZero Copy and run this one-time command on your Docker Host to install and run NodeZero.

curl "" | bash

Running script outputs:

root@u20svr:~# curl “” | bash
  % Total    % Received % Xferd  Average Speed   Time    Time     Time  Current
                                 Dload  Upload   Total   Spent    Left  Speed
100 15903  100 15903    0     0  41199      0 –:–:– –:–:– –:–:– 41199
[#] Conducting pre-checks to validate the environment is NodeZero ready:
[#] Checking Docker functionality by running the hello-world test container:
[+] PASSED: Docker version installed meets the minimum required version 20.10.
[+] PASSED: Docker is installed and functioning properly.
[#] Checking Docker permissions to volume mount files from /root directory:
[+] PASSED: Docker permissions are correct for the /root directory location.
[#] Checking Operating System:
[+] PASSED: Linux is a supported Operating System.
[#] Gathering environmental variables to conduct further checks:
[+] PASSED: All environmental variables set and proceeding with next checks.
[#] Checking host time against current UTC time:
[+] PASSED: System time is within 5 minutes of UTC time.
[#] Checking HDD space requirements (20GB Recommended, 10GB Required):
[!] WARNING: 10GB is less than the recommended 20GB free space on this disk, please ensure to prune old images before running Node Zero again.
[#] Checking 8GB RAM requirement:
[+] PASSED: This system meets the recommended minimum RAM to support NodeZero.
[#] Checking compute resource requirements:
[+] PASSED: This system has 4 CPUs which meets the minimum logical CPU requirements to run NodeZero.
[#] Pre-check validation completed successfully.
[#] Downloading NodeZero configuration …
[#] Checking for previous NodeZero configuration file artifacts:
ls: cannot access ‘/root/.nodezero/n0*.conf’: No such file or directory
[+] No previous NodeZero configuration files identified.
[#] Checking for previous NodeZero container artifacts to remove and reclaim space:
[+] Current state of containers is as follows:
[+] PASSED: No previous NodeZero containers identified.
[#] Checking for previous NodeZero image artifacts to remove and reclaim space:
[+] Current state of images is as follows:
[+] PASSED: No previous NodeZero images identified.
[#] Authenticating to Amazon ECR to pull down the NodeZero Docker container.
[+] Authentication successful.
[#] Creating the Operation specific configuration file and retrieving the latest NodeZero container, it will take a few minutes:
2024.01.10.4: Pulling from h3/n0
3bb57870a639: Pull complete
ae1edd5d9b04: Pull complete
Digest: sha256:acdb92924286dfde034065c92009940072c70204b5d7fa0d60e27c11d690e708
Status: Downloaded newer image for
[+] PASSED: Successfully pulled the latest NodeZero container.
[#] Checking if this Operation has been started already:
[#] Success! Your NodeZero Operation has been launched. The NodeZero container will automatically shut itself down after the operation is complete. To view the logs, run ‘docker logs -f n0-904b’.

Screenshot of Realtime view




By netsec

Leave a Reply