In order for Rapid7 to the data from Salesforce it needs to function, what minimum permissions and privileges are required (i.e. read on which objects, fields, etc.)? Due to security compliance concerns, I'm hesitant to provide "View All" privileges if it's not required.
Posted by Nick Dempsey 8 months ago
Hi I have to reinstall my Vitual Machine. When I try to use my key to activate it, I received an error "Activation failed: Cannot activate at this time" I chech my Internet connection and browser and everithing is fine. I do not if the key is tied to virtual machine before. I apprecite your help Sandra
Posted by Sandra Suarez 8 months ago
Hello I have a situation where I have exploited a buffer overflow and have gained a meterpreter connection to the victim. Now I am trying to escalate privileges, I am using the bypass uac exploit but it gets caught by the antivirus, my question is can I encode the bypass uac exploit to send through the meterpreter session?
Posted by Jon Pel 8 months ago
Nexpose tells me that many servers have PHP vulnerabilities related to an out-of-date version of PHP. According to our sysadmins, PHP is being updated by RedHat packages and not individually. Is there a way to tell Nexpose to check the OS version instead of PHP version alone? Thanks! Joe
Posted by Joe Toug 8 months ago
I've been using the Community edition for two years now, and Just starting last week, all of the scans against regular workstations show risk = 0, servers still show Risk values greater than 3-400 hundred like before, and the total number of Vulnerabilities has dropped to 10. As much as I'd love to believe a Windows Update or similar has suddenly eliminated all my vulnerabilities, I highly doubt it. What happened? This problem does coincide with a reinstall per support instructions because of a Java error. Is this related too?
Posted by Dan Guzman 8 months ago
We are seeing an increase in false positives due to backporting of patches on Redhat when conducting a DMZ scan. How is nexpose handling these potenital false positives and backporting? The scanner log shows it is detecting Red Hat "[http_header.server] Matching against banner: Apache/2.4.6 (Red Hat Enterprise Linux)" but has no mention of the possible backport of patches. The fingerprint of the OS comes out like this: Linux General Linux HTTPS 0.75 Linux General Linux HTTP 0.75 Linux Linux General Linux 2.6.32 IP stack analysis 0.64 Linux Linux General Linux 3.12 IP stack analysis 0.63 Linux Linux General Linux 2.6.39 IP stack analysis 0.62 Linux Linux General Linux 2.6.9 IP stack analysis 0.6 Linux Linux General Linux 2.6.35 IP stack analysis 0.6 Linux Linux General Linux 2.6.18 IP stack analysis 0.6 Does anyone have experience with this? I can confirm through a third party audit from a different vendor the same host was detected as a possible backport of patches and therfore, potinal false positives were excluded with a more correct fingerprint of "Linux Kernel 3.10 on Red Hat Enterprise Linux 7"
Posted by Bob 8 months ago
I am new to metasploit pro. I am wondering about the exploit button. When you go into a project and click exploit what exploits does it run? I keep seeing this error ( Exploit failed: A payload has not been selected.) I dont see any options to choose payloads. Also with the listeners. I create them and I specify the port. When I kick off an exploit and I specify the port range it says (A callback port has not been selected) I created 4 listeners with ports from 11500 - 11504. So I specify that range in the exploit kick off. Is there any good video tutorials for beginners? I found a couple on yourtube but they were worthless.
Posted by Scott Oliver 8 months ago
Our whole nexpose solution is in scope for pcidss and we have been scanning the scanners from the local engine , we have now also started to scan for cis compliance on the scan engines as part of the evidence for the audits ..my question is in two parts .. 1) is it good practice to actualy scan the engines themselves when idle using the local console and credentials , the reason i ask is that we see no vulns on the scanners but we see open ports namely those required for normal operation 40814 and 22 id assumed this to be ok but we have just had a pen test done and it as showed up a lot of issues regarding tls and cyphers that nexpose didn't ....we are using full audit template. 2) policy scans do not seem to show any policy information for the scanners related to cis even though its confirmed correct configuration as we do policy checks for other systems and see the relevant information so I'm now wondering if indeed its good practice to scan the scanners from within nexpose itself as the information seems unreliable
Posted by dean mulley 8 months ago
I try to connect Rapid7 Nexpose as a vulnability asset for my McAfeeESM, but get "A connection to the server with the supplied parameters could not be made. Please check your network settings. VAER1 HTTP ERROR: 302" error. I have no firewall between ESM and NexposeConsole. Im absolutly sure that my settings are correct for ESM,
Posted by Sectoit 8 months ago
Good Morning All Currently, our security team uses Nexpose and they initiate the scans from their server which can take a very long time. Is there a client-side component that I can deploy using SCCM for example that can kick off the scan and send the results to the server? Thank you
Posted by Efren Martinez 8 months ago
Maybe I'm not understanding the persistence module correctly, but I don't have a problem exploiting the server, and setting persistence. I use the option "set STARTUP SYSTEM", but the compromised server will only launch a connection back upon login and promptly shuts down after I log off. I'm trying to create persistence whether or not a user is logged in. Is there a way to do this? Thanks
Posted by Al Baker 8 months ago
msf5 exploit(unix/ftp/vsftpd_234_backdoor) > show options Module options (exploit/unix/ftp/vsftpd_234_backdoor): Name Current Setting Required Description ---- --------------- -------- ----------- RHOST [REDACTED] yes The target address RPORT 21 yes The target port (TCP) Payload options (cmd/unix/interact): Name Current Setting Required Description ---- --------------- -------- ----------- Exploit target: Id Name -- ---- 0 Automatic msf5 exploit(unix/ftp/vsftpd_234_backdoor) > exploit [*] [REDACTED]:21 - Banner: 220 (vsFTPd 2.3.4) [*] [REDACTED]:21 - USER: 331 Please specify the password. [*] Exploit completed, but no session was created. Whenever I try to exploit something on my Debian VPS, it never seems to open up a session. I've tried different exploits like eternalblue, and after around 20 different exploit attempts, no session opened up. The example above is just on of the few exploits that doesn't work. I am hosting metasploit from the internet so it isn't on LAN where you would use private IP's like 192.168.0.1. I think the issue is dealing with my firewall or something of that nature since the exploit can succeed, but no session opens. Any suggestions on what to do?
Posted by Chris Rose 8 months ago
Can you please tell me the best practice to scan assets according to the environment to which they correspond (testing, production, development)? About our scenario: There are dedicated network segments for specific environments, there is also a mixed network segment that today represents a problem when scanning. The final solution is to completely separate each environment but this task will take a lot of time and we need to start using the insightVM tool to report the status now. Thank you
Posted by Diego Sosa 8 months ago
How can I get the PostGreSQL query below to only consider the most recent scan and to only run for a specific policy? select da.ip_address, da.host_name, dos.name as OS, dos.version as OS_Version, dp.title as Policy_Title, dpr.title as Rule_Name, dpr.description as Rule_Description, dprs.description as Complaince_Status from fact_asset_policy_rule as fpr join dim_asset as da on fpr.asset_id = da.asset_id join dim_operating_system as dos using (operating_system_id) join dim_policy as dp on fpr.policy_id = dp.policy_id join dim_policy_rule as dpr on fpr.rule_id = dpr.rule_id join dim_policy_result_status as dprs on fpr.status_id = dprs.status_id
Posted by Nelson R. Linares 8 months ago