metasploit-framework/plugins/nessus.rb

1930 lines
66 KiB
Ruby

# $Id$ $Revision$
require 'nessus_rest'
module Msf
PLUGIN_NAME = 'Nessus'.freeze
PLUGIN_DESCRIPTION = 'Nessus Bridge for Metasploit'.freeze
class Plugin::Nessus < Msf::Plugin
def name
PLUGIN_NAME
end
def desc
PLUGIN_DESCRIPTION
end
class ConsoleCommandDispatcher
include Msf::Ui::Console::CommandDispatcher
def name
PLUGIN_NAME
end
def xindex
"#{Msf::Config.config_directory}/nessus_index"
end
def nessus_yaml
"#{Msf::Config.config_directory}/nessus.yaml"
end
def msf_local
Msf::Config.local_directory.to_s
end
def commands
{
'nessus_connect' => 'Connect to a nessus server: nconnect username:password@hostname:port <verify_ssl>',
'nessus_admin' => 'Checks if user is an admin',
'nessus_help' => 'Get help on all commands',
'nessus_logout' => 'Terminate the session',
'nessus_server_status' => 'Check the status of your Nessus server',
'nessus_server_properties' => 'Nessus server properties such as feed type, version, plugin set and server UUID',
'nessus_report_download' => 'Download a report from the nessus server in either Nessus, HTML, PDF, CSV, or DB format',
'nessus_report_vulns' => 'Get list of vulns from a report',
'nessus_report_hosts' => 'Get list of hosts from a report',
'nessus_report_host_details' => 'Get detailed information from a report item on a host',
'nessus_scan_list' => 'List of currently running Nessus scans',
'nessus_scan_new' => 'Create a new Nessus scan',
'nessus_scan_launch' => 'Launch a previously added scan',
'nessus_scan_pause' => 'Pause a running Nessus scan',
'nessus_scan_pause_all' => 'Pause all running Nessus scans',
'nessus_scan_stop' => 'Stop a running or paused Nessus scan',
'nessus_scan_stop_all' => 'Stop all running or paused Nessus scans',
'nessus_scan_resume' => 'Resume a paused Nessus scan',
'nessus_scan_resume_all' => 'Resume all paused Nessus scans',
'nessus_scan_details' => 'Return detailed information of a given scan',
'nessus_scan_export' => 'Export a scan result in either Nessus, HTML, PDF, CSV, or DB format',
'nessus_scan_export_status' => 'Check the status of scan export',
'nessus_user_list' => 'List of Nessus users',
'nessus_user_add' => 'Add a new Nessus user',
'nessus_user_del' => 'Delete a Nessus user',
'nessus_user_passwd' => 'Change Nessus Users Password',
'nessus_plugin_details' => 'List details of a particular plugin',
'nessus_plugin_list' => 'Display plugin details in a particular plugin family',
'nessus_policy_list' => 'List all polciies',
'nessus_policy_del' => 'Delete a policy',
'nessus_index' => 'Manually generates a search index for exploits',
'nessus_template_list' => 'List all the templates on the server',
'nessus_db_scan' => 'Create a scan of all IP addresses in db_hosts',
'nessus_db_scan_workspace' => 'Create a scan of all IP addresses in db_hosts for a given workspace',
'nessus_db_import' => 'Import Nessus scan to the Metasploit connected database',
'nessus_save' => 'Save credentials of the logged in user to nessus.yml',
'nessus_folder_list' => 'List folders configured on the Nessus server',
'nessus_scanner_list' => 'List the configured scanners on the Nessus server',
'nessus_family_list' => 'List all the plugin families along with their corresponding family IDs and plugin count'
}
end
def ncusage
print_status('%redYou must do this before any other commands.%clr')
print_status('Usage: ')
print_status('nessus_connect username:password@hostname:port <ssl_verify>')
print_status('Example:> nessus_connect msf:msf@192.168.1.10:8834')
print_status('OR')
print_status('nessus_connect username@hostname:port ssl_verify')
print_status('Example:> nessus_connect msf@192.168.1.10:8834 ssl_verify')
print_status('OR')
print_status('nessus_connect hostname:port ssl_verify')
print_status('Example:> nessus_connect 192.168.1.10:8834 ssl_verify')
print_status('OR')
print_status('nessus_connect')
print_status('Example:> nessus_connect')
print_status('This only works after you have saved creds with nessus_save')
return
end
# creates the index of exploit details to make searching for exploits much faster.
def create_xindex
start = Time.now
print_status("Creating Exploit Search Index - (#{xindex}) - this won't take long.")
# Use Msf::Config.config_directory as the location.
File.open(xindex.to_s, 'w+') do |f|
# need to add version line.
f.puts(Msf::Framework::Version)
framework.exploits.sort.each do |refname, mod|
stuff = ''
o = nil
begin
o = mod.new
rescue ::Exception
end
stuff << "#{refname}|#{o.name}|#{o.platform_to_s}|#{o.arch_to_s}"
next if !o
o.references.map do |x|
if x.ctx_id != 'URL'
if (x.ctx_id == 'MSB')
stuff << "|#{x.ctx_val}"
else
stuff << "|#{x.ctx_id}-#{x.ctx_val}"
end
end
end
stuff << "\n"
f.puts(stuff)
end
end
total = Time.now - start
print_status("It has taken : #{total} seconds to build the exploits search index")
end
def nessus_index
if File.exist?(xindex.to_s)
# check if it's version line matches current version.
File.open(xindex.to_s) do |f|
line = f.readline
line.chomp!
if line.to_i == Msf::Framework::RepoRevision
print_good("Exploit Index - (#{xindex}) - is valid.")
else
create_xindex
end
end
else
create_xindex
end
end
def nessus_login
if !((@user && !@user.empty?) && (@host && !@host.empty?) && (@port && !@port.empty? && (@port.to_i > 0)) && (@pass && !@pass.empty?))
print_status('You need to connect to a server first.')
ncusage
return
end
@url = "https://#{@host}:#{@port}/"
print_status("Connecting to #{@url} as #{@user}")
verify_ssl = false
if @sslv == 'verify_ssl'
verify_ssl = true
end
@n = NessusREST::Client.new(url: @url, username: @user, password: @pass, ssl_verify: verify_ssl)
if @n.authenticated
print_status("User #{@user} authenticated successfully.")
@token = 1
else
print_error('Error connecting/logging to the server!')
return
end
end
def nessus_verify_token
if @token.nil? || (@token == '')
ncusage
return false
end
true
end
def valid_policy(*args)
case args.length
when 1
pid = args[0]
else
print_error('No Policy ID supplied.')
return
end
pol = @n.list_policies
pol['policies'].each do |p|
if p['template_uuid'] == pid
return true
end
end
return false
end
def nessus_verify_db
if !(framework.db && framework.db.active)
print_error('No database has been configured, please use db_create/db_connect first')
return false
end
true
end
def check_scan(*args)
case args.length
when 1
scan_id = args[0]
else
print_error('No scan ID supplied')
return
end
scans = @n.scan_list
scans.each do |scan|
if scan['scans']['id'] == scan_id && scan['scans']['status'] == 'completed'
return true
end
end
return false
end
def is_scan_complete(scan_id)
complete = false
status = @n.scan_list
status['scans'].each do |scan|
if scan['id'] == scan_id.to_i && (scan['status'] == 'completed' || scan['status'] == 'imported')
complete = true
end
end
complete
end
def cmd_nessus_help(*_args)
tbl = Rex::Text::Table.new(
'Columns' => [
'Command',
'Help Text'
],
'SortIndex' => -1
)
tbl << [ 'Generic Commands', '' ]
tbl << [ '-----------------', '-----------------']
tbl << [ 'nessus_connect', 'Connect to a Nessus server' ]
tbl << [ 'nessus_logout', 'Logout from the Nessus server' ]
tbl << [ 'nessus_login', 'Login into the connected Nesssus server with a different username and password']
tbl << [ 'nessus_save', 'Save credentials of the logged in user to nessus.yml']
tbl << [ 'nessus_help', 'Listing of available nessus commands' ]
tbl << [ 'nessus_server_properties', 'Nessus server properties such as feed type, version, plugin set and server UUID.' ]
tbl << [ 'nessus_server_status', 'Check the status of your Nessus Server' ]
tbl << [ 'nessus_admin', 'Checks if user is an admin' ]
tbl << [ 'nessus_template_list', 'List scan or policy templates' ]
tbl << [ 'nessus_folder_list', 'List all configured folders on the Nessus server' ]
tbl << [ 'nessus_scanner_list', 'List all the scanners configured on the Nessus server' ]
tbl << [ 'Nessus Database Commands', '' ]
tbl << [ '-----------------', '-----------------' ]
tbl << [ 'nessus_db_scan', 'Create a scan of all IP addresses in db_hosts' ]
tbl << [ 'nessus_db_scan_workspace', 'Create a scan of all IP addresses in db_hosts for a given workspace' ]
tbl << [ 'nessus_db_import', 'Import Nessus scan to the Metasploit connected database' ]
tbl << [ '', '']
tbl << [ 'Reports Commands', '' ]
tbl << [ '-----------------', '-----------------']
tbl << [ 'nessus_report_hosts', 'Get list of hosts from a report' ]
tbl << [ 'nessus_report_vulns', 'Get list of vulns from a report' ]
tbl << [ 'nessus_report_host_details', 'Get detailed information from a report item on a host' ]
tbl << [ '', '']
tbl << [ 'Scan Commands', '' ]
tbl << [ '-----------------', '-----------------']
tbl << [ 'nessus_scan_list', 'List of all current Nessus scans' ]
tbl << [ 'nessus_scan_new', 'Create a new Nessus Scan' ]
tbl << [ 'nessus_scan_launch', 'Launch a newly created scan. New scans need to be manually launched through this command' ]
tbl << [ 'nessus_scan_pause', 'Pause a running Nessus scan' ]
tbl << [ 'nessus_scan_pause_all', 'Pause all running Nessus scans' ]
tbl << [ 'nessus_scan_stop', 'Stop a running or paused Nessus scan' ]
tbl << [ 'nessus_scan_stop_all', 'Stop all running or paused Nessus scans' ]
tbl << [ 'nessus_scan_resume', 'Resume a pasued Nessus scan' ]
tbl << [ 'nessus_scan_resume_all', 'Resume all paused Nessus scans' ]
tbl << [ 'nessus_scan_details', 'Return detailed information of a given scan' ]
tbl << [ 'nessus_scan_export', 'Export a scan result in either Nessus, HTML, PDF, CSV, or DB format' ]
tbl << [ 'nessus_scan_export_status', 'Check the status of an exported scan' ]
tbl << [ '', '']
tbl << [ 'Plugin Commands', '' ]
tbl << [ '-----------------', '-----------------']
tbl << [ 'nessus_plugin_list', 'List all plugins in a particular plugin family.' ]
tbl << [ 'nessus_family_list', 'List all the plugin families along with their corresponding family IDs and plugin count.' ]
tbl << [ 'nessus_plugin_details', 'List details of a particular plugin' ]
tbl << [ '', '']
tbl << [ 'User Commands', '' ]
tbl << [ '-----------------', '-----------------']
tbl << [ 'nessus_user_list', 'Show Nessus Users' ]
tbl << [ 'nessus_user_add', 'Add a new Nessus User' ]
tbl << [ 'nessus_user_del', 'Delete a Nessus User' ]
tbl << [ 'nessus_user_passwd', 'Change Nessus Users Password' ]
tbl << [ '', '']
tbl << [ 'Policy Commands', '' ]
tbl << [ '-----------------', '-----------------']
tbl << [ 'nessus_policy_list', 'List all polciies' ]
tbl << [ 'nessus_policy_del', 'Delete a policy' ]
print_line ''
print_line tbl.to_s
print_line ''
end
def cmd_nessus_index
nessus_index
end
def cmd_nessus_connect(*args)
# Check if config file exists and load it
if !args[0]
if File.exist?(nessus_yaml)
lconfig = YAML.load_file(nessus_yaml)
@user = lconfig['default']['username'].to_s
@pass = lconfig['default']['password'].to_s
@host = lconfig['default']['server'].to_s
@port = lconfig['default']['port'].to_s
nessus_login
else
ncusage
end
return
end
if args[0] == '-h'
print_status('%redYou must do this before any other commands.%clr')
print_status('Usage: ')
print_status('nessus_connect username:password@hostname:port <ssl_verify/ssl_ignore>')
print_status('%bldusername%clr and %bldpassword%clr are the ones you use to login to the nessus web front end')
print_status('%bldhostname%clr can be an IP address or a DNS name of the Nessus server.')
print_status('%bldport%clr is the RPC port that the Nessus web front end runs on. By default it is TCP port 8834.')
print_status('The "ssl_verify" to verify the SSL certificate used by the Nessus front end. By default the server')
print_status('use a self signed certificate, therefore, users should use ssl_ignore.')
return
end
if !@token == ''
print_error('You are already authenticated. Call nessus_logout before authenticating again')
return
end
if (args.empty? || args[0].empty?)
ncusage
return
end
@user = @pass = @host = @port = @sslv = nil
case args.length
when 1, 2
if args[0].include? '@'
cred, _split, targ = args[0].rpartition('@')
@user, @pass = cred.split(':', 2)
targ ||= '127.0.0.1:8834'
@host, @port = targ.split(':', 2)
else
@host, @port = args[0].split(':', 2)
end
@port ||= '8834'
@sslv = args[1]
when 3, 4, 5
ncusage
return
else
ncusage
return
end
if %r{//}.match(@host)
ncusage
return
end
if !@user
print_error('Missing Username')
ncusage
return
end
if !@pass
print_error('Missing Password')
ncusage
return
end
if !((@user && !@user.empty?) && (@host && !@host.empty?) && (@port && !@port.empty? && (@port.to_i > 0)) && (@pass && !@pass.empty?))
ncusage
return
end
nessus_login
end
def cmd_nessus_logout
logout = @n.user_logout
status = logout.to_s
if status == '200'
print_good('User account logged out successfully')
@token = ''
elsif status == '403'
print_status('No user session to logout')
else
print_error("There was some problem in logging out the user #{@user}")
end
return
end
def cmd_nessus_save(*args)
# if we are logged in, save session details to nessus.yaml
if args[0] == '-h'
print_status(' nessus_save')
return
end
if args[0]
print_status('Usage: ')
print_status('nessus_save')
return
end
group = 'default'
if ((@user && !@user.empty?) && (@host && !@host.empty?) && (@port && !@port.empty? && (@port.to_i > 0)) && (@pass && !@pass.empty?))
config = Hash.new
config = { group.to_s => { 'username' => @user, 'password' => @pass, 'server' => @host, 'port' => @port } }
File.open(nessus_yaml.to_s, 'w+') do |f|
f.puts YAML.dump(config)
end
print_good("#{nessus_yaml} created.")
else
print_error('Missing username/password/server/port - relogin and then try again.')
return
end
end
def cmd_nessus_server_properties(*args)
search_term = nil
while (arg = args.shift)
case arg
when '-h', '--help'
print_status('nessus_server_properties')
print_status('Example:> nessus_server_properties -S searchterm')
print_status('Returns information about the feed type and server version.')
return
when '-S', '--search'
search_term = /#{args.shift}/nmi
end
end
resp = @n.server_properties
tbl = Rex::Text::Table.new(
'SearchTerm' => search_term,
'Columns' => [
'Feed',
'Type',
'Nessus Version',
'Nessus Web Version',
'Plugin Set',
'Server UUID'
]
)
tbl << [ resp['feed'], resp['nessus_type'], resp['server_version'], resp['nessus_ui_version'], resp['loaded_plugin_set'], resp['server_uuid'] ]
print_line tbl.to_s
end
def cmd_nessus_server_status(*args)
search_term = nil
while (arg = args.shift)
case arg
when '-h', '--help'
print_status('nessus_server_status')
print_status('Example:> nessus_server_status -S searchterm')
print_status('Returns some status items for the server..')
return
when '-S', '--search'
search_term = /#{args.shift}/nmi
end
end
tbl = Rex::Text::Table.new(
'SearchTerm' => search_term,
'Columns' => [
'Status',
'Progress'
]
)
list = @n.server_status
tbl << [ list['progress'], list['status'] ]
print_line tbl.to_s
end
def cmd_nessus_admin(*args)
while (arg = args.shift)
case arg
when '-h', '--help'
print_status('nessus_admin')
print_status('Example:> nessus_admin')
print_status('Checks to see if the current user is an admin')
print_status('Use nessus_user_list to list all users')
return
end
end
if !nessus_verify_token
return
end
if !@n.is_admin
print_error('Your Nessus user is not an admin')
else
print_good('Your Nessus user is an admin')
end
end
def cmd_nessus_template_list(*args)
search_term = nil
while (arg = args.shift)
case arg
when '-h', '--help'
print_status('nessus_template_list <scan> | <policy>')
print_status('Example:> nessus_template_list scan -S searchterm')
print_status('OR')
print_status('nessus_template_list policy')
print_status('Returns a list of information about the scan or policy templates..')
return
when '-S', '--search'
search_term = /#{args.shift}/nmi
else
type = arg
end
end
if !nessus_verify_token
return
end
if type.in?(['scan', 'policy'])
list = @n.list_templates(type)
else
print_error('Only scan and policy are valid templates')
return
end
if list.empty?
print_status('No templates created')
return
end
tbl = Rex::Text::Table.new(
'SearchTerm' => search_term,
'Columns' => [
'Name',
'Title',
'Description',
'Subscription Only',
'Cloud Only'
]
)
list['templates'].each do |template|
tbl << [ template['name'], template['title'], template['desc'], template['subscription_only'], template['cloud_only'] ]
end
print_line
print_line tbl.to_s
end
def cmd_nessus_folder_list(*args)
search_term = nil
while (arg = args.shift)
case arg
when '-S', '--search'
search_term = /#{args.shift}/nmi
end
end
if !nessus_verify_token
return
end
list = @n.list_folders
tbl = Rex::Text::Table.new(
'SearchTerm' => search_term,
'Columns' => [
'ID',
'Name',
'Type'
]
)
list['folders'].each do |folder|
tbl << [ folder['id'], folder['name'], folder['type'] ]
end
print_line
print_line tbl.to_s
end
def cmd_nessus_scanner_list(*args)
search_term = nil
while (arg = args.shift)
case arg
when '-h', '--help'
print_status('nessus_scanner_list')
print_status('Example:> nessus_scanner_list -S searchterm')
print_status('Returns information about the feed type and server version.')
return
when '-S', '--search'
search_term = /#{args.shift}/nmi
end
end
if !nessus_verify_token
return
end
if !@n.is_admin
return
end
list = @n.list_scanners
tbl = Rex::Text::Table.new(
'SearchTerm' => search_term,
'Columns' => [
'ID',
'Name',
'Status',
'Platform',
'Plugin Set',
'UUID'
]
)
list.each do |scanner|
tbl << [ scanner['id'], scanner['name'], scanner['status'], scanner['platform'], scanner['loaded_plugin_set'], scanner['uuid'] ]
end
print_line tbl.to_s
end
def cmd_nessus_report_hosts(*args)
search_term = nil
scan_id = nil
while (arg = args.shift)
case arg
when '-h', '--help'
print_status('nessus_report_hosts <scan ID> -S searchterm')
print_status('Use nessus_scan_list to get a list of all the scans. Only completed scans can be reported.')
return
when '-S', '--search'
search_term = /#{args.shift}/nmi
else
scan_id = arg
end
end
if scan_id.nil?
print_status('Usage: ')
print_status('nessus_report_hosts <scan ID> -S searchterm')
print_status('Use nessus_scan_list to get a list of all the scans. Only completed scans can be reported.')
return
end
tbl = Rex::Text::Table.new(
'SearchTerm' => search_term,
'Columns' => [
'Host ID',
'Hostname',
'% of Critical Findings',
'% of High Findings',
'% of Medium Findings',
'% of Low Findings'
]
)
if is_scan_complete(scan_id)
details = @n.scan_details(scan_id)
details['hosts'].each do |host|
tbl << [ host['host_id'], host['hostname'], host['critical'], host['high'], host['medium'], host['low'] ]
end
print_line
print_line tbl.to_s
else
print_error('Only completed scans can be used for host reporting')
return
end
end
def cmd_nessus_report_vulns(*args)
search_term = nil
scan_id = nil
while (arg = args.shift)
case arg
when '-h', '--help'
print_status('nessus_report_vulns <scan ID> -S searchterm')
print_status('Use nessus_scan_list to get a list of all the scans. Only completed scans can be reported.')
return
when '-S', '--search'
search_term = /#{args.shift}/nmi
else
scan_id = arg
end
end
if scan_id.nil?
print_status('Usage: ')
print_status('nessus_report_vulns <scan ID>')
print_status('Use nessus_scan_list to get a list of all the scans. Only completed scans can be reported.')
return
end
tbl = Rex::Text::Table.new(
'SearchTerm' => search_term,
'Columns' => [
'Plugin ID',
'Plugin Name',
'Plugin Family',
'Vulnerability Count'
]
)
if is_scan_complete(scan_id)
details = @n.scan_details(scan_id)
details['vulnerabilities'].each do |vuln|
tbl << [ vuln['plugin_id'], vuln['plugin_name'], vuln['plugin_family'], vuln['count'] ]
end
print_line
print_line tbl.to_s
else
print_error('Only completed scans can be used for vulnerability reporting')
end
return
end
def cmd_nessus_report_host_details(*args)
search_term = nil
search_vuln = nil
scan_id = nil
host_id = nil
while (arg = args.shift)
case arg
when '-h', '--help'
print_status('nessus_report_host_details <scan ID> <host ID>')
print_status('Example:> nessus_report_host_details 10 5 -S hostinfo -SV vulninfo')
print_status('Use nessus_scan_list to get list of all scans. Only completed scans can be used for reporting.')
print_status('Use nessus_report_hosts to get a list of all the hosts along with their corresponding host IDs.')
return
when '-S', '--search'
search_term = /#{args.shift}/nmi
when '-SV', '--search-vuln'
search_vuln = /#{args.shift}/nmi
else
scan_id =
arg,
host_id = args.shift
end
end
if [scan_id, host_id].any?(&:nil?)
print_status('Usage: ')
print_status('nessus_report_host_detail <scan ID> <host ID>')
print_status('Example:> nessus_report_host_detail 10 5')
print_status('Use nessus_scan_list to get list of all scans. Only completed scans can be used for reporting.')
print_status('Use nessus_report_hosts <scan ID> to get a list of all the hosts along with their corresponding host IDs.')
return
end
tbl = Rex::Text::Table.new(
'SearchTerm' => search_term,
'Columns' => [
'Plugin Name',
'Plugin Famil',
'Severity'
]
)
details = @n.host_detail(scan_id, host_id)
print_line
print_status('Host information')
print_line("IP Address: #{details['info']['host-ip']}")
print_line("Hostname: #{details['info']['host-name']}")
print_line("Operating System: #{details['info']['operating-system']}")
print_line
print_status('Vulnerability information')
details['vulnerabilities'].each do |vuln|
tbl << [ vuln['plugin_name'], vuln['plugin_family'], vuln['severity'] ]
end
print_line tbl.to_s
tbl2 = Rex::Text::Table.new(
'SearchTerm' => search_vuln,
'Columns' => [
'Plugin Name',
'Plugin Famil',
'Severity'
]
)
print_status('Compliance information')
details['compliance'].each do |comp|
tbl2 << [ comp['plugin_name'], comp['plugin_family'], comp['severity'] ]
end
print_line tbl2.to_s
end
def cmd_nessus_report_download(*args)
if args[0] == '-h'
print_status('nessus_scan_report_download <scan_id> <file ID> ')
print_status('Use nessus_scan_export_status <scan ID> <file ID> to check the export status.')
print_status('Use nessus_scan_list -c to list all completed scans along with their corresponding scan IDs')
return
end
if !nessus_verify_token
return
end
case args.length
when 2
scan_id = args[0]
file_id = args[1]
if is_scan_complete(scan_id)
report = @n.report_download(scan_id, file_id)
File.open("#{msf_local}/#{scan_id}-#{file_id}", 'w+') do |f|
f.puts report
print_status("Report downloaded to #{msf_local} directory")
end
else
print_error('Only completed scans can be downloaded')
end
else
print_status('Usage: ')
print_status('nessus_scan_report_download <scan_id> <file ID> ')
print_status('Use nessus_scan_export_status <scan ID> <file ID> to check the export status.')
print_status('Use nessus_scan_list -c to list all completed scans along with their corresponding scan IDs')
end
end
def cmd_nessus_report_host_ports(*args)
search_term = nil
rid = nil
host = nil
while (arg = args.shift)
case arg
when '-h', '--help'
print_status('nessus_report_host_ports <hostname> <report id>')
print_status('Example:> nessus_report_host_ports 192.168.1.250 f0eabba3-4065-7d54-5763-f191e98eb0f7f9f33db7e75a06ca -S searchterm')
print_status('Returns all the ports associated with a host and details about their vulnerabilities')
print_status('Use nessus_report_hosts to list all available hosts for a report')
return
when '-S', '--search'
search_term = /#{args.shift}/nmi
else
scan_id = arg
end
end
if [host, rid].any?(&:nil?)
print_status('Usage: ')
print_status('nessus_report_host_ports <hostname> <report id>')
print_status('Use nessus_report_list to list all available reports')
return
end
tbl = Rex::Text::Table.new(
'SearchTerm' => search_term,
'Columns' => [
'Port',
'Protocol',
'Severity',
'Service Name',
'Sev 0',
'Sev 1',
'Sev 2',
'Sev 3'
]
)
ports = @n.report_host_ports(rid, host)
ports.each do |port|
tbl << [ port['portnum'], port['protocol'], port['severity'], port['svcname'], port['sev0'], port['sev1'], port['sev2'], port['sev3'] ]
end
print_good('Host Info')
print_good "\n"
print_line tbl.to_s
print_status('You can:')
print_status('Get detailed scan infromation about a specfic port: nessus_report_host_detail <hostname> <port> <protocol> <report id>')
end
def cmd_nessus_report_del(*args)
if args[0] == '-h'
print_status('nessus_report_del <reportname>')
print_status('Example:> nessus_report_del f0eabba3-4065-7d54-5763-f191e98eb0f7f9f33db7e75a06ca')
print_status('Must be an admin to del reports.')
print_status('Use nessus_report_list to list all reports')
return
end
if !nessus_verify_token
return
end
if !@n.is_admin
print_error('Your Nessus user is not an admin')
return
end
case args.length
when 1
rid = args[0]
else
print_status('Usage: ')
print_status('nessus_report_del <report ID>')
print_status('nessus_report_list to find the id.')
return
end
del = @n.report_del(rid)
status = del.root.elements['status'].text
if status == 'OK'
print_good("Report #{rid} has been deleted")
else
print_error("Report #{rid} was not deleted")
end
end
def cmd_nessus_scan_list(*args)
search_term = nil
while (arg = args.shift)
case arg
when '-h', '--help'
print_status('nessus_scan_list')
print_status('Example:> nessus_scan_list -S searchterm')
print_status('Returns a list of information about currently running scans.')
return
when '-S', '--search'
search_term = /#{args.shift}/nmi
end
end
if !nessus_verify_token
return
end
list = @n.scan_list
if list.to_s.empty?
print_status('No scans performed.')
return
else
tbl = Rex::Text::Table.new(
'SearchTerm' => search_term,
'Columns' => [
'Scan ID',
'Name',
'Owner',
'Started',
'Status',
'Folder'
]
)
list['scans'].each do |scan|
if args[0] == '-r'
if scan['status'] == 'running'
tbl << [ scan['id'], scan['name'], scan['owner'], scan['starttime'], scan['status'], scan['folder_id'] ]
end
elsif args[0] == '-p'
if scan['status'] == 'paused'
tbl << [ scan['id'], scan['name'], scan['owner'], scan['starttime'], scan['status'], scan['folder_id'] ]
end
elsif args[0] == '-c'
if scan['status'] == 'completed'
tbl << [ scan['id'], scan['name'], scan['owner'], scan['starttime'], scan['status'], scan['folder_id'] ]
end
elsif args[0] == '-a'
if scan['status'] == 'canceled'
tbl << [ scan['id'], scan['name'], scan['owner'], scan['starttime'], scan['status'], scan['folder_id'] ]
end
else
tbl << [ scan['id'], scan['name'], scan['owner'], scan['starttime'], scan['status'], scan['folder_id'] ]
end
end
print_line tbl.to_s
end
end
def cmd_nessus_scan_new(*args)
if args[0] == '-h'
print_status('nessus_scan_new <UUID of Policy> <Scan name> <Description> <Targets>')
print_status('Use nessus_policy_list to list all available policies with their corresponding UUIDs')
return
end
if !nessus_verify_token
return
end
case args.length
when 4
uuid = args[0]
scan_name = args[1]
description = args[2]
targets = args[3]
else
print_status('Usage: ')
print_status('nessus_scan_new <UUID of Policy> <Scan name> <Description> <Targets>')
print_status('Use nessus_policy_list to list all available policies with their corresponding UUIDs')
return
end
if valid_policy(uuid)
print_status("Creating scan from policy number #{uuid}, called #{scan_name} - #{description} and scanning #{targets}")
et = {
'enabled' => false,
'launch' => 'ONETIME',
'name' => scan_name,
'text_targets' => targets,
'description' => description,
'launch_now' => false
}
scan = @n.scan_create(uuid, et)
tbl = Rex::Text::Table.new(
'Columns' => [
'Scan ID',
'Scanner ID',
'Policy ID',
'Targets',
'Owner'
]
)
print_status('New scan added')
tbl << [ scan['scan']['id'], scan['scan']['scanner_id'], scan['scan']['policy_id'], scan['scan']['custom_targets'], scan['scan']['owner'] ]
print_status("Use nessus_scan_launch #{scan['scan']['id']} to launch the scan")
print_line tbl.to_s
else
print_error('The policy does not exist')
end
end
def cmd_nessus_scan_launch(*args)
if args[0] == '-h'
print_status('nessus_scan_launch <scan ID>')
print_status('Use nessus_scan_list to list all the availabla scans with their corresponding scan IDs')
end
if !nessus_verify_token
return
end
case args.length
when 1
scan_id = args[0]
else
print_status('Usage: ')
print_status('nessus_scan_launch <scan ID>')
print_status('Use nessus_scan_list to list all the availabla scans with their corresponding scan IDs')
return
end
launch = @n.scan_launch(scan_id)
print_good("Scan ID #{scan_id} successfully launched. The Scan UUID is #{launch['scan_uuid']}")
end
def cmd_nessus_scan_pause(*args)
if args[0] == '-h'
print_status('nessus_scan_pause <scan id>')
print_status('Example:> nessus_scan_pause f0eabba3-4065-7d54-5763-f191e98eb0f7f9f33db7e75a06ca')
print_status('Pauses a running scan')
print_status('Use nessus_scan_list to list all available scans')
return
end
if !nessus_verify_token
return
end
case args.length
when 1
sid = args[0]
else
print_status('Usage: ')
print_status('nessus_scan_pause <scan id>')
print_status('Use nessus_scan_list to list all available scans')
return
end
pause = @n.scan_pause(sid)
if pause['error']
print_error 'Invalid scan ID'
else
print_status("#{sid} has been paused")
end
end
def cmd_nessus_db_scan(*args)
if args[0] == '-h'
print_status('nessus_db_scan <policy ID> <scan name> <scan description>')
print_status('Creates a scan based on all the hosts listed in db_hosts.')
print_status('Use nessus_policy_list to list all available policies with their corresponding policy IDs')
return
end
if !nessus_verify_db
return
end
if !nessus_verify_token
return
end
case args.length
when 3
policy_id = args[0]
name = args[1]
desc = args[3]
else
print_status('Usage: ')
print_status('nessus_db_scan <policy ID> <scan name> <scan description>')
print_status('Use nessus_policy_list to list all available policies with their corresponding policy IDs')
return
end
if !valid_policy(policy_id)
print_error('That policy does not exist.')
return
end
targets = ''
framework.db.hosts.each do |host|
targets << host.address
targets << ','
end
targets.chop!
print_status("Creating scan from policy #{policy_id}, called \"#{name}\" and scanning all hosts in all the workspaces")
et = {
'enabled' => false,
'launch' => 'ONETIME',
'name' => name,
'text_targets' => targets,
'description' => desc,
'launch_now' => true
}
scan = @n.scan_create(policy_id, et)
if !scan['error']
scan = scan['scan']
print_status("Scan ID #{scan['id']} successfully created and launched")
else
print_error(JSON.pretty_generate(scan))
end
end
def cmd_nessus_db_scan_workspace(*args)
if args[0] == '-h'
print_status('nessus_db_scan_workspace <policy ID> <scan name> <scan description> <workspace>')
print_status('Creates a scan based on all the hosts listed in db_hosts for a given workspace.')
print_status('Use nessus_policy_list to list all available policies with their corresponding policy IDs')
return
end
if !nessus_verify_db
return
end
if !nessus_verify_token
return
end
case args.length
when 4
policy_id = args[0]
name = args[1]
desc = args[2]
new_workspace = framework.db.find_workspace(args[3])
else
print_status('Usage: ')
print_status('nessus_db_scan_workspace <policy ID> <scan name> <scan description> <workspace>')
print_status('Use nessus_policy_list to list all available policies with their corresponding policy IDs')
return
end
if !valid_policy(policy_id)
print_error('That policy does not exist.')
return
end
if new_workspace.nil?
print_error('That workspace does not exist.')
return
end
framework.db.workspace = new_workspace
print_status("Switched workspace: #{framework.db.workspace.name}")
targets = ''
framework.db.hosts.each do |host|
targets << host.address
targets << ','
print_status("Targets: #{targets}")
end
targets.chop!
print_status("Creating scan from policy #{policy_id}, called \"#{name}\" and scanning all hosts in #{framework.db.workspace.name}")
et = {
'enabled' => false,
'launch' => 'ONETIME',
'name' => name,
'text_targets' => targets,
'description' => desc,
'launch_now' => false
}
scan = @n.scan_create(policy_id, et)
if !scan['error']
scan = scan['scan']
print_status("Scan ID #{scan['id']} successfully created")
print_status("Run nessus_scan_launch #{scan['id']} to launch the scan")
else
print_error(JSON.pretty_generate(scan))
end
end
def cmd_nessus_db_import(*args)
if args[0] == '-h'
print_status('nessus_db_import <scan ID>')
print_status('Example:> nessus_db_import 500')
print_status('Use nessus_scan_list -c to list all completed scans')
end
if !nessus_verify_db
return
end
if !nessus_verify_token
return
end
case args.length
when 1
scan_id = args[0]
else
print_status('Usage: ')
print_status('nessus_db_import <scan ID>')
print_status('Example:> nessus_db_import 500')
print_status('Use nessus_scan_list -c to list all completed scans')
end
if is_scan_complete(scan_id)
print_status("Exporting scan ID #{scan_id} is Nessus format...")
export = @n.scan_export(scan_id, 'nessus')
if export['file']
file_id = export['file']
print_good("The export file ID for scan ID #{scan_id} is #{file_id}")
print_status('Checking export status...')
loop do
status = @n.scan_export_status(scan_id, file_id)
print_status('Export status: ' + status['status'])
if status['status'] == 'ready'
break
end
sleep(1)
break unless (status['status'] == 'loading')
end
if status['status'] == 'ready'
print_status("The status of scan ID #{scan_id} export is ready")
select(nil, nil, nil, 5)
report = @n.report_download(scan_id, file_id)
print_status('Importing scan results to the database...')
framework.db.import({ data: report }) do |type, data|
case type
when :address
print_status("Importing data of #{data}")
end
end
print_good('Done')
else
print_error("There was some problem in exporting the scan. The error message is #{status}")
end
else
print_error(export)
end
else
print_error('Only completed scans could be used for import')
end
end
def cmd_nessus_scan_pause_all(*args)
scan_ids = Array.new
if args[0] == '-h'
print_status('nessus_scan_pause_all')
print_status('Example:> nessus_scan_pause_all')
print_status('Pauses all currently running scans')
print_status('Use nessus_scan_list to list all running scans')
return
end
if !nessus_verify_token
return
end
list = @n.scan_list
list['scans'].each do |scan|
if scan['status'] == 'running'
scan_ids << scan['id']
end
end
if !scan_ids.empty?
scan_ids.each do |scan_id|
@n.scan_pause(scan_id)
end
print_status('All scans have been paused')
else
print_error('No running scans')
end
end
def cmd_nessus_scan_stop(*args)
if args[0] == '-h'
print_status('nessus_scan_stop <scan id>')
print_status('Example:> nessus_scan_stop f0eabba3-4065-7d54-5763-f191e98eb0f7f9f33db7e75a06ca')
print_status('Stops a currently running scans')
print_status('Use nessus_scan_list to list all running scans')
return
end
if !nessus_verify_token
return
end
case args.length
when 1
sid = args[0]
else
print_status('Usage: ')
print_status('nessus_scan_stop <scan id>')
print_status('Use nessus_scan_list to list all available scans')
return
end
stop = @n.scan_stop(sid)
if stop['error']
print_error 'Invalid scan ID'
else
print_status("#{sid} has been stopped")
end
end
def cmd_nessus_scan_stop_all(*args)
scan_ids = Array.new
if args[0] == '-h'
print_status('nessus_scan_stop_all')
print_status('Example:> nessus_scan_stop_all')
print_status('stops all currently running scans')
print_status('Use nessus_scan_list to list all running scans')
return
end
if !nessus_verify_token
return
end
list = @n.scan_list
list['scans'].each do |scan|
if scan['status'] == 'running' || scan['status'] == 'paused'
scan_ids << scan['id']
end
end
if !scan_ids.empty?
scan_ids.each do |scan_id|
@n.scan_stop(scan_id)
end
print_status('All scans have been stopped')
else
print_error('No running or paused scans to be stopped')
end
end
def cmd_nessus_scan_resume(*args)
if args[0] == '-h'
print_status('nessus_scan_resume <scan id>')
print_status('Example:> nessus_scan_resume f0eabba3-4065-7d54-5763-f191e98eb0f7f9f33db7e75a06ca')
print_status('resumes a running scan')
print_status('Use nessus_scan_list to list all available scans')
return
end
if !nessus_verify_token
return
end
case args.length
when 1
sid = args[0]
else
print_status('Usage: ')
print_status('nessus_scan_resume <scan id>')
print_status('Use nessus_scan_list to list all available scans')
return
end
resume = @n.scan_resume(sid)
if resume['error']
print_error 'Invalid scan ID'
else
print_status("#{sid} has been resumed")
end
end
def cmd_nessus_scan_resume_all(*args)
scan_ids = Array.new
if args[0] == '-h'
print_status('nessus_scan_resume_all')
print_status('Example:> nessus_scan_resume_all')
print_status('resumes all currently running scans')
print_status('Use nessus_scan_list to list all running scans')
return
end
if !nessus_verify_token
return
end
list = @n.scan_list
list['scans'].each do |scan|
if scan['status'] == 'paused'
scan_ids << scan['id']
end
end
if !scan_ids.empty?
scan_ids.each do |scan_id|
@n.scan_resume(scan_id)
end
print_status('All scans have been resumed')
else
print_error('No running scans to be resumed')
end
end
def cmd_nessus_scan_details(*args)
valid_categories = ['info', 'hosts', 'vulnerabilities', 'history']
search_term = nil
scan_id = nil
category = nil
while (arg = args.shift)
case arg
when '-h', '--help'
print_status('Usage: ')
print_status('nessus_scan_details <scan ID> <category> -S searchterm')
print_status('Availble categories are info, hosts, vulnerabilities, and history')
print_status('Use nessus_scan_list to list all available scans with their corresponding scan IDs')
return
when '-S', '--search'
search_term = /#{args.shift}/nmi
else
scan_id = arg
if args[0].in?(valid_categories)
category = args.shift
else
print_error('Invalid category. The available categories are info, hosts, vulnerabilities, and history')
return
end
end
end
if !nessus_verify_token
return
end
details = @n.scan_details(scan_id)
if category == 'info'
tbl = Rex::Text::Table.new(
'SearchTerm' => search_term,
'Columns' => [
'Status',
'Policy',
'Scan Name',
'Scan Targets',
'Scan Start Time',
'Scan End Time'
]
)
tbl << [ details['info']['status'], details['info']['policy'], details['info']['name'], details['info']['targets'], details['info']['scan_start'], details['info']['scan_end'] ]
elsif category == 'hosts'
tbl = Rex::Text::Table.new(
'SearchTerm' => search_term,
'Columns' => [
'Host ID',
'Hostname',
'% of Critical Findings',
'% of High Findings',
'% of Medium Findings',
'% of Low Findings'
]
)
details['hosts'].each do |host|
tbl << [ host['host_id'], host['hostname'], host['critical'], host['high'], host['medium'], host['low'] ]
end
elsif category == 'vulnerabilities'
tbl = Rex::Text::Table.new(
'SearchTerm' => search_term,
'Columns' => [
'Plugin ID',
'Plugin Name',
'Plugin Family',
'Count'
]
)
details['vulnerabilities'].each do |vuln|
tbl << [ vuln['plugin_id'], vuln['plugin_name'], vuln['plugin_family'], vuln['count'] ]
end
elsif category == 'history'
tbl = Rex::Text::Table.new(
'SearchTerm' => search_term,
'Columns' => [
'History ID',
'Status',
'Creation Date',
'Last Modification Date'
]
)
details['history'].each do |hist|
tbl << [ hist['history_id'], hist['status'], hist['creation_date'], hist['modification_date'] ]
end
end
print_line tbl.to_s
end
def cmd_nessus_scan_export(*args)
if args[0] == '-h'
print_status('nessus_scan_export <scan ID> <export format>')
print_status('The available export formats are Nessus, HTML, PDF, CSV, or DB')
print_status('Use nessus_scan_list to list all available scans with their corresponding scan IDs')
return
end
if !nessus_verify_token
return
end
case args.length
when 2
scan_id = args[0]
format = args[1].downcase
else
print_status('Usage: ')
print_status('nessus_scan_export <scan ID> <export format>')
print_status('The available export formats are Nessus, HTML, PDF, CSV, or DB')
print_status('Use nessus_scan_list to list all available scans with their corresponding scan IDs')
return
end
if format.in?(['nessus', 'html', 'pdf', 'csv', 'db'])
export = @n.scan_export(scan_id, format)
if export['file']
file_id = export['file']
print_good("The export file ID for scan ID #{scan_id} is #{file_id}")
print_status('Checking export status...')
loop do
status = @n.scan_export_status(scan_id, file_id)
print_status('Export status: ' + status['status'])
if status['status'] == 'ready'
break
end
sleep(1)
break unless (status['status'] == 'loading')
end
if status['status'] == 'ready'
print_good("The status of scan ID #{scan_id} export is ready")
else
print_error("There was some problem in exporting the scan. The error message is #{status}")
end
else
print_error(export)
end
else
print_error('Invalid export format. The available export formats are Nessus, HTML, PDF, CSV, or DB')
return
end
end
def cmd_nessus_scan_export_status(*args)
if args[0] == '-h'
print_status('nessus_scan_export_status <scan ID> <file ID>')
print_status('Use nessus_scan_export <scan ID> <format> to export a scan and get its file ID')
end
if !nessus_verify_token
return
end
case args.length
when 2
scan_id = args[0]
file_id = args[1]
loop do
status = @n.scan_export_status(scan_id, file_id)
print_status('Export status: ' + status['status'])
if status['status'] == 'ready'
break
end
sleep(1)
break unless (status['status'] == 'loading')
end
if status['status'] == 'ready'
print_status("The status of scan ID #{scan_id} export is ready")
else
print_error("There was some problem in exporting the scan. The error message is #{status}")
end
else
print_status('Usage: ')
print_status('nessus_scan_export_status <scan ID> <file ID>')
print_status('Use nessus_scan_export <scan ID> <format> to export a scan and get its file ID')
end
end
def cmd_nessus_plugin_list(*args)
search_term = nil
family_id = nil
while (arg = args.shift)
case arg
when '-h', '--help'
print_status('nessus_plugin_list <Family ID> -S searchterm')
print_status('Example:> nessus_plugin_list 10')
print_status('Returns a list of all plugins in that family.')
print_status('Use nessus_family_list to display all the plugin families along with their corresponding family IDs')
return
when '-S', '--search'
search_term = /#{args.shift}/nmi
else
family_id = arg
end
end
if family_id.nil?
print_status('Usage: ')
print_status('nessus_plugin_list <Family ID>')
print_status('Use nessus_family_list to display all the plugin families along with their corresponding family IDs')
return
end
tbl = Rex::Text::Table.new(
'SearchTerm' => search_term,
'Columns' => [
'Plugin ID',
'Plugin Name'
]
)
list = @n.list_plugins(family_id)
list['plugins'].each do |plugin|
tbl << [ plugin['id'], plugin['name'] ]
end
print_line
print_good("Plugin Family Name: #{list['name']}")
print_line
print_line tbl.to_s
end
def cmd_nessus_family_list(*args)
search_term = nil
while (arg = args.shift)
case arg
when '-h', '--help'
print_status('nessus_family_list')
print_status('Example:> nessus_family_list -S searchterm')
print_status('Returns a list of all the plugin families along with their corresponding family IDs and plugin count.')
return
when '-S', '--search'
search_term = /#{args.shift}/nmi
end
end
list = @n.list_families
tbl = Rex::Text::Table.new(
'SearchTerm' => search_term,
'Columns' => [
'Family ID',
'Family Name',
'Number of Plugins'
]
)
list['families'].each do |family|
tbl << [ family['id'], family['name'], family['count'] ]
end
print_line
print_line tbl.to_s
end
def cmd_nessus_plugin_details(*args)
search_term = nil
plugin_id = nil
while (arg = args.shift)
case arg
when '-h', '--help'
print_status('nessus_plugin_details <Plugin ID>')
print_status('Example:> nessus_plugin_details 10264 -S searchterm')
print_status('Returns details on a particular plugin.')
print_status('Use nessus_plugin_list to list all plugins and their corresponding plugin IDs belonging to a particular plugin family.')
return
when '-S', '--search'
search_term = /#{args.shift}/nmi
else
plugin_id = arg
end
end
if !nessus_verify_token
return
end
if plugin_id.nil?
print_status('Usage: ')
print_status('nessus_plugin_details <Plugin ID>')
print_status('Use nessus_plugin_list to list all plugins and their corresponding plugin IDs belonging to a particular plugin family.')
return
end
tbl = Rex::Text::Table.new(
'SearchTerm' => search_term,
'Columns' => [
'Reference',
'Value'
]
)
begin
list = @n.plugin_details(plugin_id)
rescue ::Exception => e
if e.message =~ /unexpected token/
print_error('No plugin info found')
return
else
raise e
end
end
list['attributes'].each do |attrib|
tbl << [ attrib['attribute_name'], attrib['attribute_value'] ]
end
print_line
print_good("Plugin Name: #{list['name']}")
print_good("Plugin Family: #{list['family_name']}")
print_line
print_line tbl.to_s
end
def cmd_nessus_user_list(*args)
scan_id = nil
while (arg = args.shift)
case arg
when '-h', '--help'
print_status('nessus_user_list')
print_status('Example:> nessus_user_list -S searchterm')
print_status('Returns a list of the users on the Nessus server and their access level.')
return
when '-S', '--search'
search_term = /#{args.shift}/nmi
end
end
if !nessus_verify_token
return
end
if !@n.is_admin
print_status('Your Nessus user is not an admin')
end
list = @n.list_users
tbl = Rex::Text::Table.new(
'SearchTerm' => search_term,
'Columns' => [
'ID',
'Name',
'Username',
'Type',
'Email',
'Permissions'
]
)
list['users'].each do |user|
tbl << [ user['id'], user['name'], user['username'], user['type'], user['email'], user['permissions'] ]
end
print_line
print_line tbl.to_s
end
def cmd_nessus_user_add(*args)
if args[0] == '-h'
print_status('nessus_user_add <username> <password> <permissions> <type>')
print_status('Permissions are 32, 64, and 128')
print_status('Type can be either local or LDAP')
print_status('Example:> nessus_user_add msf msf 16 local')
print_status('You need to be an admin in order to add accounts')
print_status('Use nessus_user_list to list all users')
return
end
if !nessus_verify_token
return
end
if !@n.is_admin
print_error('Your Nessus user is not an admin')
return
end
case args.length
when 4
user = args[0]
pass = args[1]
permissions = args[2]
type = args[3]
else
print_status('Usage')
print_status('nessus_user_add <username> <password> <permissions> <type>')
return
end
add = @n.user_add(user, pass, permissions, type)
if add['id']
print_good("#{user} created successfully")
else
print_error(add.to_s)
end
end
def cmd_nessus_user_del(*args)
if args[0] == '-h'
print_status('nessus_user_del <User ID>')
print_status('Example:> nessus_user_del 10')
print_status('This command can only delete non admin users. You must be an admin to delete users.')
print_status('Use nessus_user_list to list all users with their corresponding user IDs')
return
end
if !nessus_verify_token
return
end
if !@n.is_admin
print_error('Your Nessus user is not an admin')
return
end
case args.length
when 1
user_id = args[0]
else
print_status('Usage: ')
print_status('nessus_user_del <User ID>')
print_status('This command can only delete non admin users')
return
end
del = @n.user_delete(user_id)
status = del.to_s
if status == '200'
print_good("User account having user ID #{user_id} deleted successfully")
elsif status == '403'
print_error("You do not have permission to delete the user account having user ID #{user_id}")
elsif status == '404'
print_error("User account having user ID #{user_id} does not exist")
elsif status == '409'
print_error('You cannot delete your own account')
elsif status == '500'
print_error("The server failed to delete the user account having user ID #{user_id}")
else
print_error("Unknown problem occured by deleting the user account having user ID #{user_id}.")
end
end
def cmd_nessus_user_passwd(*args)
if args[0] == '-h'
print_status('nessus_user_passwd <User ID> <New Password>')
print_status('Example:> nessus_user_passwd 10 mynewpassword')
print_status('Changes the password of a user. You must be an admin to change passwords.')
print_status('Use nessus_user_list to list all users with their corresponding user IDs')
return
end
if !nessus_verify_token
return
end
if !@n.is_admin
print_error('Your Nessus user is not an admin')
return
end
case args.length
when 2
user_id = args[0]
pass = args[1]
else
print_status('Usage: ')
print_status('nessus_user_passwd <User ID> <New Password>')
print_status('Use nessus_user_list to list all users with their corresponding user IDs')
return
end
pass = @n.user_chpasswd(user_id, pass)
status = pass.to_s
if status == '200'
print_good("Password of account having user ID #{user_id} changed successfully")
elsif status == '400'
print_error('Password is too short')
elsif status == '403'
print_error("You do not have the permission to change password for the user having user ID #{user_id}")
elsif status == '404'
print_error("User having user ID #{user_id} does not exist")
elsif status == '500'
print_error('Nessus server failed to changed the user password')
else
print_error('Unknown problem occured while changing the user password')
end
end
def cmd_nessus_policy_list(*args)
search_term = nil
while (arg = args.shift)
case arg
when '-h', '--help'
print_status('nessus_policy_list')
print_status('Example:> nessus_policy_list -S searchterm')
print_status('Lists all policies on the server')
return
when '-S', '--search'
search_term = /#{args.shift}/nmi
end
end
if !nessus_verify_token
return
end
list = @n.list_policies
unless list['policies']
print_error('No policies found')
return
end
tbl = Rex::Text::Table.new(
'Columns' => [
'Policy ID',
'Name',
'Policy UUID'
]
)
list['policies'].each do |policy|
tbl << [ policy['id'], policy['name'], policy['template_uuid'] ]
end
print_line tbl.to_s
end
def cmd_nessus_policy_del(*args)
if args[0] == '-h'
print_status('nessus_policy_del <policy ID>')
print_status('Example:> nessus_policy_del 1')
print_status('You must be an admin to delete policies.')
print_status('Use nessus_policy_list to list all policies with their corresponding policy IDs')
return
end
if !nessus_verify_token
return
end
if !@n.is_admin
print_error('Your Nessus user is not an admin')
return
end
case args.length
when 1
policy_id = args[0]
else
print_status('Usage: ')
print_status('nessus_policy_del <policy ID>')
print_status('Use nessus_policy_list to list all the policies with their corresponding policy IDs')
return
end
del = @n.policy_delete(policy_id)
status = del.to_s
if status == '200'
print_good("Policy ID #{policy_id} successfully deleted")
elsif status == '403'
print_error("You do not have permission to delete policy ID #{policy_id}")
elsif status == '404'
print_error("Policy ID #{policy_id} does not exist")
elsif status == '405'
print_error("Policy ID #{policy_id} is currently in use and cannot be deleted")
else
print_error("Unknown problem occured by deleting the user account having user ID #{user_id}.")
end
end
end
def initialize(framework, opts)
super
add_console_dispatcher(ConsoleCommandDispatcher)
print_status(PLUGIN_DESCRIPTION)
print_status('Type %bldnessus_help%clr for a command listing')
end
def cleanup
remove_console_dispatcher('Nessus')
end
end
end