I am trying to build a basic automated report for server review self service with the following query. Borrowing from another post and adding my own SQL on top, my error states: Error:column css.credential_status_description does not exist Character:946 I only get an error when adding in the SELECT for creds_status. All documentation web and PDF states that column does indeed exist. I have returned results for that column in a straightforward query. Help. My Query is: WITH all_tags AS ( SELECT asset_id, tag_name AS all_tags FROM dim_tag JOIN dim_tag_asset dta USING (tag_id) GROUP BY asset_id, tag_name ), policy_set AS ( SELECT asset_id, description AS policy_set FROM fact_asset_policy_rule JOIN dim_policy_result_status dprs USING (status_id) GROUP BY asset_id, description ), policy_rules AS ( SELECT asset_id, title AS policy_rules FROM fact_asset_policy_rule JOIN dim_policy_rule USING (rule_id) GROUP BY asset_id, title ), creds_status AS ( SELECT asset_id, credential_status_description AS creds_status FROM dim_asset_service_credential JOIN dim_credential_status USING (credential_status_id) GROUP BY asset_id, credential_status_description ) SELECT ip_address as "IP Address", host_name as "Hostname", dos.description AS "OS", alt.all_tags as "Tags", ps.policy_set as "Policy Status", pr.policy_rules as "Policy Rule", css.credential_status_description as "Credential Status" FROM dim_asset JOIN dim_operating_system dos USING (operating_system_id) LEFT OUTER JOIN all_tags alt USING (asset_id) LEFT OUTER JOIN policy_set ps USING (asset_id) LEFT OUTER JOIN policy_rules pr USING (asset_id) LEFT OUTER JOIN creds_status css USING (asset_id) Matt
Posted by Matthew Swenk 6 months ago
We installed version 2.2.0 (we also have 1.2.2 installed) on our servicenow developer instance and when we try to run Nexpose Integration Last Scan (first run of the application, section 4), it is immediately failing with the error : "Encountered error running the integration. ReferenceError: "sn_automation" is not defined." Any assistance is appreciated. Thanks. Patrick Hames
Posted by Patrick Hames 6 months ago
Hello , I'm running kali linux and my virtual-box has metasploitable 2 I made an Nmap scan and found a lot of opened port and I want to exploit port 512/tcp open exec 513/tcp open login 514/tcp open shell When I made research i found I can access with root privileges if i type rlogin -l root <ip-of-metasploitable> When I run that I get this error root@kali:~# rlogin -l root 192.168.43.113 rlogind: Host address mismatch. any help please
Posted by Ayoub Elaich 6 months ago
System event error provided ======================================== Python could not construct the class instance Traceback (most recent call last): File "E:\jenkins\WORKSP~1\PYD4C1~1\agent\persistence\winsvc.py", line 26, in __init__ File "E:\jenkins\WORKSP~1\PYD4C1~1\agent\agent.py", line 206, in __init__ File "E:\jenkins\WORKSP~1\PYD4C1~1\agent\agent_config.py", line 640, in __init__ File "E:\jenkins\WORKSP~1\PYD4C1~1\agent\agent_config.py", line 645, in _load_config File "E:\jenkins\WORKSP~1\PYD4C1~1\agent\agent_config.py", line 482, in validate File "E:\jenkins\WORKSP~1\PYD4C1~1\agent\agent_config.py", line 600, in _check_type ValueError: client_crt is required %2: %3
Posted by Rony Chudnovsky 6 months ago
I'm trying to execute a custom query in InsightIDR to search for top abused domains. This is my query: public_suffix = xyz OR biz OR ga OR gg OR men OR cf OR ga OR tk OR work OR top OR click OR ml However I also get .com results. What am I doing wrong?
Posted by Ciber Seg 6 months ago
When I run the following: select da.ip_address, da.host_name, dos.name as OS, dos.version as OS_Version, dp.title as Policy_Title, dpr.title as Rule_Name, dpr.description as Rule_Description, dprs.description as Complaince_Status from fact_asset_policy_rule as fpr join dim_asset as da on fpr.asset_id = da.asset_id join dim_operating_system as dos using (operating_system_id) join dim_policy as dp on fpr.policy_id = dp.policy_id join dim_policy_rule as dpr on fpr.rule_id = dpr.rule_id join dim_policy_result_status as dprs on fpr.status_id = dprs.status_id I get duplicate returns based upon how many times the server was scanned, but there in no associated scan date provided. Software certificate installation files must be removed from a system. Software certificate installation files must be removed from a system. Software certificate installation files must be removed from a system. How do I get the date for each of the scans, so that I can filter out the old scans?
Posted by Stephen R. Harashack 6 months ago
I am using Nexpose Community Edition and scanning windows 10 machines. I am not able to perform successful scanning and DCE Authentication failure on port 135 occurs. However port 445 returns me with credential success output. Kindly guide
Posted by Malik Yaseen 6 months ago
I am not an administrator but a User of Nexpose so I don't believe I have all the accesses. My question is this, I see an asset group with custom asset tags. The asset tags have pretty long-winded names that only mean something internally. How do i tell what the criteria of the asset tag is? This is the part that is puzzling me. An asset group, with 2 custom asset tags, but I can't figure out what its filtering on. Is it correct that the custom asset tag actually has criteria set, but I probably don't have rights to see?
Posted by Robert Glus 6 months ago
I'm having problems getting a SQL query to work properly. I'm trying to pull high level statistics for a simple monthly metrics report but the query I've developed doesn't pass the validate step in the report creation screen. Every time I clear an error another one pops up. Any suggestions? Here's the latest version of the query. SELECT dta.tag_name AS "Asset Category", COUNT(da.asset_id) AS "Asset ID", SUM(fa.vulnerabilities) AS "Total Vulnerabilities", SUM(fa.severe_vulnerabilities) AS "Severe Vulnerabilities", SUM(fa.moderate_vulnerabilities) AS "Moderate Vulnerabilities", SUM(fa.critical_vulnerabilities) AS "Critical Vulnerabilities" FROM dim_asset da JOIN fact_asset fa USING (asset_id) JOIN dim_tag_asset dta USING (asset_id) GROUP BY dta.tag_name ORDER BY dta.tag_name
Posted by Doug Schaible 6 months ago
Hello Am having issues with creating exception is Nexpose Security Console. I do not want to create exceptions based on Vulnerability or Asset. I want to create exception based on Vulnerability Proof such that if word "xyz" is present in Vulnerability proof it will create exception till a particular date provided by me. Any help will be appreciated. Thanks
Posted by Rabail Kazi 6 months ago
What is the best approach to separate Application related vulnerabilities (like Java for example) from the OS ones when reporting? Is there a way to do that in Nexpose? I tried scoping vulnerable vs venerable version but that's not necessary accurate because you will still get vulnerable version but related to the OS. I'm trying to avoid the manual work of generating a spreadsheet to filter out application vulnerabilities on a separate report.
Posted by Maiash 6 months ago
We have been using Nexpose for a couple of years now, and our biggest hurdle, right now, is getting information about our Cisco IP phones into Nexpose. Is that a possibility that others have seen a solution to? The phone's internal web server presents a lot of information, but it doesn't look like it's discoverable any other way! Thanks!
Posted by Joshua Marquis 6 months ago
Can you advise on what registry keys Nexpose looks for in regards to the Meltdown/Spectre vulnerabilities? Our understanding is that to enable the software patches Microsoft has released for all three vulnerabilities, the following keys need to be set under HKLM\System\CurrentControlSet\Control\Session Manager\Memory Management: FeatureSettingsOverride: 0 FeatureSettingsOverrideMask: 3 However, we have found assets in our inventory that have the following keys, which according to Microsoft is to disable all the mitigations. Nexpose is not showing these assets as being vulnerable to Meltdown or Spectre: FeatureSettingsOverride: 3 FeatureSettingsOverrideMask: 3 But Nexpose is (correctly, I believe) picking up assets that have the Spectre Variant 2 vulnerability because they have the following: FeatureSettingsOverride: 1 FeatureSettingsOverrideMask: 3 So basically the reg keys should be 3/0. But we have assets at 3/3 that are not showing vulnerable, and I'm not sure why?
Posted by John Magnetta 6 months ago
I would like to start automating full scans on newly discovered hosts and was looking to use the "Automated Actions" in Nexpose to do so. I would also like to move them to a new site to allow for more self service for reviewing scans. After reviewing this: https://blog.rapid7.com/2015/10/08/nexpose-60-new-feature-adaptive-security/, it looks like there should be an option for "Move to site and scan" however I do not see that option available to me in Nexpose. Is this option only available for certain discovery connections? Is there any way to do this with a normal discovery scan? I was successful at moving hosts to a new site with this action, however when I tried an automated action of "Scan in site" when "Known Asset available" it did not fire off a scan. I am guessing this is due to Nexpose not viewing these moved assets as assets belonging to that site until a scan is performed?
Posted by Robert DeBellis 6 months ago
Please stick/archive or move to knowledge base for others. Thank you. Rapid7 data warehouse extraction setup • Rapid7 data warehousing export only supports POSTGRES SQL; so install a new instance to use a staging/bucket location: o Download the flavor of POSTGRES you need. https://www.postgresql.org/download/ o Install an instance calling it whatever you want. If this is done on the Rapid7 host machine, you need to make sure to adjust the port address as the Rapid7 PG instance is using the default. o Make note of the admin login when you set it up. o After the install is complete, we need to make a new database inside it. For reference: the DB was labeled as: nxp_bucket If there is a need for UI tools; please see this link. • https://www.pgadmin.org/download/ • In order to get the data structure and data out of Rapid7, an export must be setup: o Log into Rapid7 and navigate to the “Administration” section. o Look for “Maintenance, Storage and Troubleshooting” section. o Locate the “Data Warehousing” description and click “Manage”. o This will bring you to configuration settings. Place a check to: “Enable export” DataModel: Dimensional Server address: (localhost, 127.0.0.1, or name of the server) Server port: (whatever port was assigned when the instance was installed) Database name: nxp_bucket (or whatever it was labeled as) User & Password Test the connection before continuing o Next, select the schedule that works best. o Data retention was left blank. o Save your configuration. • To get SSIS/SSDT packages to work (I used SQLServer2016 and MS SSDT), we need a driver and a DSN connection: o Download the latest driver, x64 is recommended. https://www.postgresql.org/ftp/odbc/versions/msi/ o Run through the install. o Next, open up ODBC Admin. Start > run ODBCAD32 o Once the ODBC Admin window is open: Click the SystemDSN tab Add new data source Scroll down and find “PostgreSQL Unicode” and click finish The next screen is the basic connection setup, all options were left default. Feel free to explore and tweak as needed. Test the connection before saving o Close the ODBC admin window. • Now a new ODBC connection can be set up inside SSDT: o Open SSDT, setup a new project, and add a new SSIS package. o In the “Connection Managers” section of the package, right-click and add a “New Connection”. In the list, scroll down to “ODBC” and click add In the connection manager, click “New” On the next window, use the drop down and the system DSN that was created earlier should be listed in the drop down. Use the Postgres one and provide the login info. Test the connection before clicking OK. o You should now have a new connection to work with in the package. • This setup exports **everything** into our staging/bucket. • Schema documentation can be found here: o https://help.rapid7.com/nexpose/en-us/warehouse/warehouse-schema.html • Using this documentation, code the package to pull as much or as little as needed.
Posted by Mark W 6 months ago
I installed the InsightVM engine on an ubuntu 16.04 server, went to the login page via https://public-ip:3780 and was not asked to enter the license key like I was on another test I did but where I used https://localhost:3780 instead. I tried to manually navigate to https://public-ip:3780/admin/global/nsc.jsp to enter in the license key but the licensing tab doesn't have a unique url to load that information.
Posted by Steve 6 months ago