Nessus
Ruby-Nessus is a ruby interface for the popular Nessus vulnerability scanner. Ruby-Nessus aims to deliver an easy yet powerful interface for interacting and manipulating Nessus scan results and configurations. Ruby-Nessus currently supports both version 1.0 and 2.0 of the .nessus file format.

Installation

1
gem install ruby-nessus
Copied!

Usage

In this example I'm going to search the Nessus report for any hosts with vulnerabilities which can be exploited using Metasploit.
1
require 'ruby-nessus'
2
3
ness = RubyNessus::Parse.new("/path/to/nessus_report.nessus")
4
5
ness.scan.each_host do |host|
6
host.each_event do |event|
7
if event.exploit_framework_metasploit
8
puts "#{host.ip}\t#{event.name}"
9
end
10
end
11
end
Copied!
Output:
1
172.17.1.96 MS08-067: Microsoft Windows Server Service Crafted RPC Request Handling Remote Code Execution (958644) (ECLIPSEDWING) (uncredentialed check)
2
172.17.1.96 MS17-010: Security Update for Microsoft Windows SMB Server (4013389) (ETERNALBLUE) (ETERNALCHAMPION) (ETERNALROMANCE) (ETERNALSYNERGY) (WannaCry) (EternalRocks) (Petya) (uncredentialed check)
3
172.17.1.96 MS09-001: Microsoft Windows SMB Vulnerabilities Remote Code Execution (958687) (uncredentialed check)
4
172.17.1.93 MS08-067: Microsoft Windows Server Service Crafted RPC Request Handling Remote Code Execution (958644) (ECLIPSEDWING) (uncredentialed check)
5
172.17.1.93 MS17-010: Security Update for Microsoft Windows SMB Server (4013389) (ETERNALBLUE) (ETERNALCHAMPION) (ETERNALROMANCE) (ETERNALSYNERGY) (WannaCry) (EternalRocks) (Petya) (uncredentialed check)
6
172.17.1.93 MS12-020: Vulnerabilities in Remote Desktop Could Allow Remote Code Execution (2671387) (uncredentialed check)
7
172.17.1.50 Microsoft RDP RCE (CVE-2019-0708) (BlueKeep) (uncredentialed check)
Copied!
Read more on GitHub.
Last modified 1yr ago
Copy link