Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Nessus new #18477

Merged
merged 7 commits into from
Dec 20, 2023
Merged
Changes from 4 commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
Original file line number Diff line number Diff line change
@@ -0,0 +1,85 @@
## Vulnerable Application

This module will attempt to authenticate to a Nessus server RPC interface.

## Verification Steps
1. Start msfconsole
2. Do: `use auxiliary/scanner/nessus/nessus_rest_login`
AleksaZatezalo marked this conversation as resolved.
Show resolved Hide resolved
3. Do: set usernames and passwords via the `username` and `password` options, or pass a list via `user_file` and `pass_file` options
4. Do: `run`
5. Hopefully you see somthing like this:
```
[+] 127.0.0.1:8834 - Successful: nessus:4x15pa$$w0rd
```

## Options
### BLANK_PASSWORDS
Try blank passwords for all users

### BRUTEFORCE_SPEED
How fast to bruteforce, from 0 to 5

### DB_ALL_CREDS
Try each user/password couple stored in the current database

### DB_ALL_PASS
Add all passwords in the current database to the list

### DB_ALL_USERS
Add all users in the current database to the list

### DB_SKIP_EXISTING
Skip existing credentials stored in the current database (Accepted: none, user, user&realm)

### PASSWORD
A specific password to authenticate with

### PASS_FILE
File containing passwords, one per line

### STOP_ON_SUCCESS
Stop guessing when a credential works for a host

### TARGETURI
The path to the Nessus server login API

### THREADS
The number of concurrent threads (max one per host)

### USERNAME
A specific username to authenticate as

### USERPASS_FILE
File containing users and passwords separated by space, one pair per line

### USER_AS_PASS
Try the username as the password for all users

### USER_FILE
File containing usernames, one per line

### VERBOSE
Whether to print output for all attempts

### VHOST
HTTP server virtual host

## Scenarios
Specific demo of using the module that might be useful in a real world scenario.

```
msf > use scanner/nessus/nessus_rest_login
msf6 auxiliary(scanner/nessus/nessus_rest_login) > set rhosts 127.0.0.1
AleksaZatezalo marked this conversation as resolved.
Show resolved Hide resolved
rhosts => 127.0.0.1
msf6 auxiliary(scanner/nessus/nessus_rest_login) > set password N0tpassword!
password => N0tpassword!
msf6 auxiliary(scanner/nessus/nessus_rest_login) > set username notuser
username => notuser
msf6 auxiliary(scanner/nessus/nessus_rest_login) > run

[*] Attempting to login to /stop using password list
[+] 127.0.0.1:8834 - Success: 'notuser:N0tpassword'!
AleksaZatezalo marked this conversation as resolved.
Show resolved Hide resolved
[*] Auxiliary module execution completed
msf6 auxiliary(scanner/nessus/nessus_rest_login) >
```