Talking in the #metasploit channel on freenode.net today someone (you know who you are) gave me the idea of saving the username, password, hostname/ip and port to a nessus.yaml file so they would be saved between metasploit sessions.
So tonight, I added that. New commands added are:
- nessus_save: this will save those 4 items to ~/.msf3/nessus.yaml
- nessus_logout will now remove that file when invoked.
- nessus_connect will look for that file and use it’s contents if invoked with no arguments. If the file doesn’t exist, it will display usage.
So basically, load nessus, nessus_connect admin:[email protected]:8834 and then nessus_save. Now each time you load nessus you just need to nessus_connect and it will reuse those saved creds, until you wiped them out with nessus_logout.
Up next is investigating a way to have the nessus.yaml house multiple sets of creds and let you invoke nessus_connect with the set name to login to that server (or the default set if no set name is given). also need to modify nessus_save to take an argument that it will use for the set name. Tackle that later this week I guess.
It’s been merged, so svn up and you are set. Report bugs to me or via the metasploit redmine.
Posted in Bananas and tagged Auto, Draft, idea, logout, Metasploit, nessus, new feature, password, report bugs, today, yaml by Zate with no comments yet.
One of the most frustrating things for me when I started with metasploit (known as msf from here in) was not exploiting something, but finding something to exploit. I had all these exploits at my finger tips but my ability to find something to pwn was limited by having to move back and forth between a bunch of tools and cross reference things.
This changed when I did my PwB v3 course, I got much better at determining when and how to use msf to take advantage of something I found. There was still a lot of moving between tools but I was at least able to identify vulnerable hosts.
I use Nessus in my day job to scan for vulns and sometimes I need to be able to turn those results into demonstrations or do false positive checking. It was a little annoying to run the scan either from the cli, or usually from the Nessus Web Client and then have to manually import the Nessusv2 report.
At the same time MSF Express came out. WoW, that is some slick shit. (more…)
Posted in Bananas, Security, Stuff, Technology, Things and tagged Bridge, Commands, finger, generic commands, intro one, Metasploit, msf, nessus server, pwb, report bugs by Zate with 7 comments.