This weekend (Oct 23rd and 24th) I will be in Charleston WV presenting/demoing the Nessus Bridge for Metasploit at Hack3rcon. This will be the first time I’ll have presented anything outside of work and should be lots of fun. Quite a few great speakers that I look forward to meeting.
I’ll post the presentation up here once it’s done for everyone else to take a look at. Actually going to be presenting a few new commands that are not in the metasploit svn version of the plugin.
After Hack3rcon I’ll be back into high gear adding some new functionality to the plugin and branching out into writing a wrapper for Nessus to speak IVIL for Seccubus v2. This is pretty exciting stuff for me. Coming up with a xml format to speak “findings” that is tool agnostic is going to be a great thing. It will mean moving findings between tools, or comparing findings between tools, will be much much easier. Keep a look out for that one.
There has been some talk on the metasploit mailing list this week about using tools such as Nessus to scan through a MSF pivot and into another network. Some interesting discussion and I think it’s something I will dive into in these next few weeks. Start to examine what some of the limitations are and how we might overcome or avoid them.
that’s it for now. have a good weekend.
Posted in Bananas, Security, Stuff, Technology, Things and tagged agnostic, Auto, Bridge, charleston wv, Draft, Hack, hacker convention, look, Metasploit, metasploit framework, nessus, Oct, Presenting, using tools, work, xml format by Zate with no comments yet.
Next up are the plugin commands. These helpful little beasts are all about showing you what plugins are available on your nessus server, and how many of them you have.
Given that nessus has over 38,000 plugins, simply asking it to list them all would result in a very large list returned from the server. Nessus gets around this by breaking the request down into several parts. (more…)
Posted in Bananas, Security, Stuff, Technology, Things and tagged Auto, Bridge, Commands, CVE, default server, Draft, family names, list, little beasts, Metasploit, nessus, nessus server, plugin, prefs, risk factor, server plugin, Value, web by Zate with no comments yet.
The Scan Commands are where this plugin starts to really differ from previously importing nessus scans from flat files. With these commands we can stay within the metasploit framework and reach out and examine things with Nessus. We can then use the Report Commands we just learnt about to pull that data back to later pwn stuff.
Scan Commands are as follows:
- nessus_scan_resume_all (more…)
Posted in Bananas, Security, Stuff, Technology, Things and tagged Auto, Bridge, Commands, confirmation, Draft, functionality, learnt, line, lt, Metasploit, metasploit framework, nessus, pwn, range, Report, Scan, Start, status, stop, tab, use by Zate with no comments yet.
One of the most frustrating things for me when I started with metasploit (known as msf from here in) was not exploiting something, but finding something to exploit. I had all these exploits at my finger tips but my ability to find something to pwn was limited by having to move back and forth between a bunch of tools and cross reference things.
This changed when I did my PwB v3 course, I got much better at determining when and how to use msf to take advantage of something I found. There was still a lot of moving between tools but I was at least able to identify vulnerable hosts.
I use Nessus in my day job to scan for vulns and sometimes I need to be able to turn those results into demonstrations or do false positive checking. It was a little annoying to run the scan either from the cli, or usually from the Nessus Web Client and then have to manually import the Nessusv2 report.
At the same time MSF Express came out. WoW, that is some slick shit. (more…)
Posted in Bananas, Security, Stuff, Technology, Things and tagged Bridge, Commands, finger, generic commands, intro one, Metasploit, msf, nessus server, pwb, report bugs by Zate with 7 comments.