2009-12-01 03:10:16 +00:00
#!/usr/bin/env ruby
#
2010-05-03 17:13:09 +00:00
# $Id$
#
2011-10-03 19:22:30 +00:00
# This plugin provides integration with Rapid7 Nexpose
2009-12-01 03:10:16 +00:00
#
2010-05-03 17:13:09 +00:00
# $Revision$
#
2017-01-25 16:13:28 +00:00
require 'nexpose'
2010-03-15 03:19:25 +00:00
2009-12-01 03:10:16 +00:00
module Msf
2013-09-30 18:47:53 +00:00
Nexpose_yaml = " #{ Msf :: Config . get_config_root } /nexpose.yaml " #location of the nexpose.yml containing saved nexpose creds
2011-12-23 22:12:34 +00:00
2009-12-01 03:10:16 +00:00
class Plugin :: Nexpose < Msf :: Plugin
2013-09-30 18:47:53 +00:00
class NexposeCommandDispatcher
include Msf :: Ui :: Console :: CommandDispatcher
def name
" Nexpose "
end
def commands
{
'nexpose_connect' = > " Connect to a running Nexpose instance ( user:pass@host[:port] ) " ,
'nexpose_save' = > " Save credentials to a Nexpose instance " ,
'nexpose_activity' = > " Display any active scan jobs on the Nexpose instance " ,
'nexpose_scan' = > " Launch a Nexpose scan against a specific IP range and import the results " ,
'nexpose_discover' = > " Launch a scan but only perform host and minimal service discovery " ,
'nexpose_exhaustive' = > " Launch a scan covering all TCP ports and all authorized safe checks " ,
'nexpose_dos' = > " Launch a scan that includes checks that can crash services and devices (caution) " ,
'nexpose_disconnect' = > " Disconnect from an active Nexpose instance " ,
'nexpose_sites' = > " List all defined sites " ,
'nexpose_site_devices' = > " List all discovered devices within a site " ,
'nexpose_site_import' = > " Import data from the specified site ID " ,
'nexpose_report_templates' = > " List all available report templates " ,
'nexpose_command' = > " Execute a console command on the Nexpose instance " ,
'nexpose_sysinfo' = > " Display detailed system information about the Nexpose instance " ,
# TODO:
# nexpose_stop_scan
}
end
def nexpose_verify_db
if ! ( framework . db and framework . db . usable and framework . db . active )
print_error ( " No database has been configured, please use db_create/db_connect first " )
return false
end
true
end
def nexpose_verify
return false if not nexpose_verify_db
if ! @nsc
print_error ( " No active Nexpose instance has been configured, please use 'nexpose_connect' " )
return false
end
true
end
def cmd_nexpose_save ( * args )
#if we are logged in, save session details to nexpose.yaml
if args [ 0 ] == " -h "
print_status ( " Usage: " )
print_status ( " nexpose_save " )
return
end
if args [ 0 ]
print_status ( " Usage: " )
print_status ( " nexpose_save " )
return
end
group = " default "
if ( ( @user and @user . length > 0 ) and ( @host and @host . length > 0 ) and ( @port and @port . length > 0 and @port . to_i > 0 ) and ( @pass and @pass . length > 0 ) )
2016-11-03 20:54:07 +00:00
config = { " #{ group } " = > { 'username' = > @user , 'password' = > @pass , 'server' = > @host , 'port' = > @port , 'trust_cert' = > @trust_cert } }
2013-09-30 18:47:53 +00:00
:: File . open ( " #{ Nexpose_yaml } " , " wb " ) { | f | f . puts YAML . dump ( config ) }
print_good ( " #{ Nexpose_yaml } created. " )
else
print_error ( " Missing username/password/server/port - relogin and then try again. " )
return
end
end
def cmd_nexpose_connect ( * args )
return if not nexpose_verify_db
if ! args [ 0 ]
if :: File . readable? ( " #{ Nexpose_yaml } " )
lconfig = YAML . load_file ( " #{ Nexpose_yaml } " )
@user = lconfig [ 'default' ] [ 'username' ]
@pass = lconfig [ 'default' ] [ 'password' ]
@host = lconfig [ 'default' ] [ 'server' ]
@port = lconfig [ 'default' ] [ 'port' ]
2016-11-03 20:54:07 +00:00
@trust_cert = lconfig [ 'default' ] [ 'trust_cert' ]
unless @trust_cert
@sslv = " ok " # TODO: Not super-thrilled about bypassing the SSL warning...
end
2013-09-30 18:47:53 +00:00
nexpose_login
return
end
end
if ( args . length == 0 or args [ 0 ] . empty? or args [ 0 ] == " -h " )
2016-11-03 20:54:07 +00:00
nexpose_usage
2013-09-30 18:47:53 +00:00
return
end
2016-11-03 20:54:07 +00:00
@user = @pass = @host = @port = @sslv = @trust_cert = @trust_cert_file = nil
2013-09-30 18:47:53 +00:00
case args . length
when 1 , 2
cred , targ = args [ 0 ] . split ( '@' , 2 )
@user , @pass = cred . split ( ':' , 2 )
targ || = '127.0.0.1:3780'
@host , @port = targ . split ( ':' , 2 )
2016-11-03 20:54:07 +00:00
@port || = '3780'
unless args . length == 1
@trust_cert_file = args [ 1 ]
if File . exists? @trust_cert_file
@trust_cert = File . read ( @trust_cert_file )
end
end
2013-09-30 18:47:53 +00:00
when 4 , 5
2016-11-03 20:54:07 +00:00
@user , @pass , @host , @port , @trust_cert = args
unless args . length == 4
@trust_cert_file = @trust_cert
if File . exists? @trust_cert_file
@trust_cert = File . read ( @trust_cert_file )
end
end
2013-09-30 18:47:53 +00:00
else
2016-11-03 20:54:07 +00:00
nexpose_usage
2013-09-30 18:47:53 +00:00
return
end
nexpose_login
end
2016-11-03 20:54:07 +00:00
def nexpose_usage
print_status ( " Usage: " )
print_status ( " nexpose_connect username:password@host[:port] <ssl-confirm> " )
print_status ( " -OR- " )
print_status ( " nexpose_connect username password host port <ssl-confirm> " )
end
2013-09-30 18:47:53 +00:00
def nexpose_login
if ! ( ( @user and @user . length > 0 ) and ( @host and @host . length > 0 ) and ( @port and @port . length > 0 and @port . to_i > 0 ) and ( @pass and @pass . length > 0 ) )
2016-11-03 20:54:07 +00:00
nexpose_usage
2013-09-30 18:47:53 +00:00
return
end
2016-11-03 20:54:07 +00:00
if ( @host != " localhost " and @host != " 127.0.0.1 " and ( @trust_cert . nil? && @sslv != " ok " ) )
# consider removing this message and replacing with check on trust_store, and if trust_store is not found validate @host already has a truly trusted cert?
2013-09-30 18:47:53 +00:00
print_error ( " Warning: SSL connections are not verified in this release, it is possible for an attacker " )
print_error ( " with the ability to man-in-the-middle the Nexpose traffic to capture the Nexpose " )
print_error ( " credentials. If you are running this on a trusted network, please pass in 'ok' " )
print_error ( " as an additional parameter to this command. " )
return
end
2016-11-03 20:54:07 +00:00
# Wrap this so a duplicate session does not prevent a new login
2013-09-30 18:47:53 +00:00
begin
cmd_nexpose_disconnect
rescue :: Interrupt
raise $!
rescue :: Exception
end
begin
print_status ( " Connecting to Nexpose instance at #{ @host } : #{ @port } with username #{ @user } ... " )
2016-11-03 20:54:07 +00:00
nsc = Nexpose :: Connection . new ( @host , @user , @pass , @port , nil , nil , @trust_cert )
2013-09-30 18:47:53 +00:00
nsc . login
rescue :: Nexpose :: APIError = > e
print_error ( " Connection failed: #{ e . reason } " )
return
end
@nsc = nsc
nexpose_compatibility_check
nsc
end
def cmd_nexpose_activity ( * args )
return if not nexpose_verify
scans = @nsc . scan_activity || [ ]
case scans . length
when 0
print_status ( " There are currently no active scan jobs on this Nexpose instance " )
when 1
print_status ( " There is 1 active scan job on this Nexpose instance " )
else
print_status ( " There are currently #{ scans . length } active scan jobs on this Nexpose instance " )
end
scans . each do | scan |
2017-01-25 16:13:28 +00:00
print_status ( " Scan # #{ scan . scan_id } is running on Engine # #{ scan . engine_id } against site # #{ scan . site_id } since #{ scan . start_time . to_s } " )
2013-09-30 18:47:53 +00:00
end
end
def cmd_nexpose_sites ( * args )
return if not nexpose_verify
2017-01-25 16:13:28 +00:00
sites = @nsc . list_sites || [ ]
2013-09-30 18:47:53 +00:00
case sites . length
when 0
print_status ( " There are currently no active sites on this Nexpose instance " )
end
sites . each do | site |
2017-01-25 16:13:28 +00:00
print_status ( " Site # #{ site . id } ' #{ site . name } ' Risk Factor: #{ site . risk_factor } Risk Score: #{ site . risk_score } " )
2013-09-30 18:47:53 +00:00
end
end
def cmd_nexpose_site_devices ( * args )
return if not nexpose_verify
site_id = args . shift
if not site_id
print_error ( " No site ID was specified " )
return
end
2017-01-25 16:13:28 +00:00
devices = @nsc . list_site_devices ( site_id ) || [ ]
2013-09-30 18:47:53 +00:00
case devices . length
when 0
print_status ( " There are currently no devices within this site " )
end
devices . each do | device |
2017-01-25 16:13:28 +00:00
print_status ( " Host: #{ device . address } ID: #{ device . id } Risk Factor: #{ device . risk_factor } Risk Score: #{ device . risk_score } " )
2013-09-30 18:47:53 +00:00
end
end
def cmd_nexpose_report_templates ( * args )
return if not nexpose_verify
2017-01-25 16:13:28 +00:00
res = @nsc . list_report_templates || [ ]
2013-09-30 18:47:53 +00:00
res . each do | report |
2017-01-25 16:13:28 +00:00
print_status ( " Template: #{ report . id } Name: ' #{ report . name } ' Description: #{ report . description } " )
2013-09-30 18:47:53 +00:00
end
end
def cmd_nexpose_command ( * args )
return if not nexpose_verify
if args . length == 0
print_error ( " No command was specified " )
return
end
res = @nsc . console_command ( args . join ( " " ) ) || " "
print_status ( " Command Output " )
print_line ( res )
print_line ( " " )
end
def cmd_nexpose_sysinfo ( * args )
return if not nexpose_verify
res = @nsc . system_information
print_status ( " System Information " )
res . each_pair do | k , v |
print_status ( " #{ k } : #{ v } " )
end
end
def nexpose_compatibility_check
res = @nsc . console_command ( " ver " )
if res !~ / ^(NSC|Console) Version ID: \ s*4[89]0 \ s*$ /m
print_error ( " " )
print_error ( " Warning: This version of Nexpose has not been tested with Metasploit! " )
print_error ( " " )
end
end
def cmd_nexpose_site_import ( * args )
site_id = args . shift
if not site_id
print_error ( " No site ID was specified " )
return
end
msfid = Time . now . to_i
report_formats = [ " raw-xml-v2 " , " ns-xml " ]
report_format = report_formats . shift
2017-01-25 16:13:28 +00:00
report = Nexpose :: ReportConfig . build ( @nsc , site_id , " Metasploit Export #{ msfid } " , " pentest-audit " , report_format , true )
report . delivery = Nexpose :: Delivery . new ( true )
2013-09-30 18:47:53 +00:00
begin
2017-01-25 16:13:28 +00:00
report . format = report_format
report . save ( @nsc )
2013-09-30 18:47:53 +00:00
rescue :: Exception = > e
report_format = report_formats . shift
if report_format
retry
end
raise e
end
print_status ( " Generating the export data file... " )
2017-01-25 16:13:28 +00:00
last_report = nil
while ( ! last_report )
last_report = @nsc . last_report ( report . id )
2013-09-30 18:47:53 +00:00
select ( nil , nil , nil , 1 . 0 )
end
2017-01-25 16:13:28 +00:00
url = last_report . uri
2013-09-30 18:47:53 +00:00
print_status ( " Downloading the export data... " )
data = @nsc . download ( url )
# Delete the temporary report ID
2017-01-25 16:13:28 +00:00
@nsc . delete_report_config ( report . id )
2013-09-30 18:47:53 +00:00
print_status ( " Importing Nexpose data... " )
process_nexpose_data ( report_format , data )
end
def cmd_nexpose_discover ( * args )
args << " -h " if args . length == 0
args << " -t "
args << " aggressive-discovery "
cmd_nexpose_scan ( * args )
end
def cmd_nexpose_exhaustive ( * args )
args << " -h " if args . length == 0
args << " -t "
args << " exhaustive-audit "
cmd_nexpose_scan ( * args )
end
def cmd_nexpose_dos ( * args )
args << " -h " if args . length == 0
args << " -t "
args << " dos-audit "
cmd_nexpose_scan ( * args )
end
def cmd_nexpose_scan ( * args )
opts = Rex :: Parser :: Arguments . new (
" -h " = > [ false , " This help menu " ] ,
" -t " = > [ true , " The scan template to use (default:pentest-audit options:full-audit,exhaustive-audit,discovery,aggressive-discovery,dos-audit) " ] ,
" -c " = > [ true , " Specify credentials to use against these targets (format is type:user:pass " ] ,
" -n " = > [ true , " The maximum number of IPs to scan at a time (default is 32) " ] ,
" -s " = > [ true , " The directory to store the raw XML files from the Nexpose instance (optional) " ] ,
" -P " = > [ false , " Leave the scan data on the server when it completes (this counts against the maximum licensed IPs) " ] ,
" -v " = > [ false , " Display diagnostic information about the scanning process " ] ,
" -d " = > [ false , " Scan hosts based on the contents of the existing database " ] ,
" -I " = > [ true , " Only scan systems with an address within the specified range " ] ,
" -E " = > [ true , " Exclude hosts in the specified range from the scan " ]
)
opt_template = " pentest-audit "
opt_maxaddrs = 32
opt_monitor = false
opt_verbose = false
opt_savexml = nil
opt_preserve = false
opt_rescandb = false
opt_addrinc = nil
opt_addrexc = nil
opt_scanned = [ ]
opt_credentials = [ ]
opt_ranges = [ ]
opts . parse ( args ) do | opt , idx , val |
case opt
when " -h "
print_line ( " Usage: nexpose_scan [options] <Target IP Ranges> " )
print_line ( opts . usage )
return
when " -t "
opt_template = val
when " -n "
opt_maxaddrs = val . to_i
when " -s "
opt_savexml = val
when " -c "
if ( val =~ / ^([^:]+):([^:]+):(.+) / )
type , user , pass = [ $1 , $2 , $3 ]
2016-04-12 20:38:34 +00:00
msfid = Time . now . to_i
newcreds = Nexpose :: SiteCredentials . for_service ( " Metasploit Site Credential #{ msfid } " , nil , nil , nil , nil , type )
2017-01-25 16:13:28 +00:00
newcreds . user_name = user
newcreds . password = pass
2013-09-30 18:47:53 +00:00
opt_credentials << newcreds
else
print_error ( " Unrecognized Nexpose scan credentials: #{ val } " )
return
end
when " -v "
opt_verbose = true
when " -P "
opt_preserve = true
when " -d "
opt_rescandb = true
when '-I'
opt_addrinc = OptAddressRange . new ( 'TEMPRANGE' , [ true , '' ] ) . normalize ( val )
when '-E'
opt_addrexc = OptAddressRange . new ( 'TEMPRANGE' , [ true , '' ] ) . normalize ( val )
else
opt_ranges << val
end
end
return if not nexpose_verify
# Include all database hosts as scan targets if specified
if ( opt_rescandb )
print_status ( " Loading scan targets from the active database... " ) if opt_verbose
framework . db . hosts . each do | host |
next if host . state != :: Msf :: HostState :: Alive
opt_ranges << host . address
end
end
possible_files = opt_ranges # don't allow DOS by circular reference
possible_files . each do | file |
if :: File . readable? file
print_status " Parsing ranges from #{ file } "
range_list = :: File . open ( file , " rb " ) { | f | f . read f . stat . size }
range_list . each_line { | subrange | opt_ranges << subrange }
opt_ranges . delete ( file )
end
end
opt_ranges = opt_ranges . join ( ' ' )
if ( opt_ranges . strip . empty? )
print_line ( " Usage: nexpose_scan [options] <Target IP Ranges> " )
print_line ( opts . usage )
return
end
if ( opt_verbose )
print_status ( " Creating a new scan using template #{ opt_template } and #{ opt_maxaddrs } concurrent IPs against #{ opt_ranges } " )
end
range_inp = :: Msf :: OptAddressRange . new ( 'TEMPRANGE' , [ true , '' ] ) . normalize ( opt_ranges )
range = :: Rex :: Socket :: RangeWalker . new ( range_inp )
include_range = opt_addrinc ? :: Rex :: Socket :: RangeWalker . new ( opt_addrinc ) : nil
exclude_range = opt_addrexc ? :: Rex :: Socket :: RangeWalker . new ( opt_addrexc ) : nil
completed = 0
total = range . num_ips
count = 0
print_status ( " Scanning #{ total } addresses with template #{ opt_template } in sets of #{ opt_maxaddrs } " )
while ( completed < total )
count += 1
queue = [ ]
while ( ip = range . next_ip and queue . length < opt_maxaddrs )
if ( exclude_range and exclude_range . include? ( ip ) )
print_status ( " >> Skipping host #{ ip } due to exclusion " ) if opt_verbose
next
end
if ( include_range and ! include_range . include? ( ip ) )
print_status ( " >> Skipping host #{ ip } due to inclusion filter " ) if opt_verbose
next
end
opt_scanned << ip
queue << ip
end
break if queue . empty?
print_status ( " Scanning #{ queue [ 0 ] } - #{ queue [ - 1 ] } ... " ) if opt_verbose
msfid = Time . now . to_i
# Create a temporary site
2017-01-25 16:13:28 +00:00
site = Nexpose :: Site . new ( nil , opt_template )
site . name = " Metasploit- #{ msfid } "
site . description = " Autocreated by the Metasploit Framework "
site . included_addresses = queue
site . site_credentials = opt_credentials
site . save ( @nsc )
2013-09-30 18:47:53 +00:00
2017-01-25 16:13:28 +00:00
print_status ( " >> Created temporary site # #{ site . id } " ) if opt_verbose
2013-09-30 18:47:53 +00:00
report_formats = [ " raw-xml-v2 " , " ns-xml " ]
report_format = report_formats . shift
2017-01-25 16:13:28 +00:00
report = Nexpose :: ReportConfig . build ( @nsc , site . id , site . name , opt_template , report_format , true )
report . delivery = Nexpose :: Delivery . new ( true )
2013-09-30 18:47:53 +00:00
begin
2017-01-25 16:13:28 +00:00
report . format = report_format
report . save ( @nsc , true )
2013-09-30 18:47:53 +00:00
rescue :: Exception = > e
report_format = report_formats . shift
if report_format
retry
end
raise e
end
2017-01-25 16:13:28 +00:00
print_status ( " >> Created temporary report configuration # #{ report . id } " ) if opt_verbose
2013-09-30 18:47:53 +00:00
# Run the scan
2016-10-31 18:54:05 +00:00
begin
2017-01-25 16:13:28 +00:00
res = site . scan ( @nsc )
2016-10-31 18:54:05 +00:00
rescue Nexpose :: APIError = > e
nexpose_error_message = e . message
nexpose_error_message . gsub! ( / NexposeAPI: Action failed: / , '' )
print_error " #{ nexpose_error_message } "
return
end
2017-01-25 16:13:28 +00:00
sid = res . id
2013-09-30 18:47:53 +00:00
print_status ( " >> Scan has been launched with ID # #{ sid } " ) if opt_verbose
rep = true
begin
prev = nil
while ( true )
info = @nsc . scan_statistics ( sid )
2017-01-25 16:13:28 +00:00
break if info . status != " running "
stat = " Found #{ info . nodes . live } devices and #{ info . nodes . dead } unresponsive "
2013-09-30 18:47:53 +00:00
if ( stat != prev )
print_status ( " >> #{ stat } " ) if opt_verbose
end
prev = stat
select ( nil , nil , nil , 5 . 0 )
end
print_status ( " >> Scan has been completed with ID # #{ sid } " ) if opt_verbose
rescue :: Interrupt
rep = false
print_status ( " >> Terminating scan ID # #{ sid } due to console interupt " ) if opt_verbose
2017-01-25 16:13:28 +00:00
@nsc . stop_scan ( sid )
2013-09-30 18:47:53 +00:00
break
end
# Wait for the automatic report generation to complete
if ( rep )
print_status ( " >> Waiting on the report to generate... " ) if opt_verbose
2017-01-25 16:13:28 +00:00
last_report = nil
while ( ! last_report )
last_report = @nsc . last_report ( report . id )
2013-09-30 18:47:53 +00:00
select ( nil , nil , nil , 1 . 0 )
end
2017-01-25 16:13:28 +00:00
url = last_report . uri
2013-09-30 18:47:53 +00:00
print_status ( " >> Downloading the report data from Nexpose... " ) if opt_verbose
data = @nsc . download ( url )
if ( opt_savexml )
:: FileUtils . mkdir_p ( opt_savexml )
path = :: File . join ( opt_savexml , " nexpose- #{ msfid } - #{ count } .xml " )
print_status ( " >> Saving scan data into #{ path } " ) if opt_verbose
:: File . open ( path , " wb " ) { | fd | fd . write ( data ) }
end
process_nexpose_data ( report_format , data )
end
if ! opt_preserve
print_status ( " >> Deleting the temporary site and report... " ) if opt_verbose
2017-01-25 16:13:28 +00:00
begin
@nsc . delete_site ( site . id )
rescue :: Nexpose :: APIError = > e
print_status ( " >> Deletion of temporary site and report failed: #{ e . inspect } " )
end
2013-09-30 18:47:53 +00:00
end
end
print_status ( " Completed the scan of #{ total } addresses " )
end
def cmd_nexpose_disconnect ( * args )
@nsc . logout if @nsc
@nsc = nil
end
def process_nexpose_data ( fmt , data )
case fmt
when 'raw-xml-v2'
framework . db . import ( { :data = > data } )
when 'ns-xml'
framework . db . import ( { :data = > data } )
else
print_error ( " Unsupported Nexpose data format: #{ fmt } " )
end
end
#
# Nexpose vuln lookup
#
def nexpose_vuln_lookup ( doc , vid , refs , host , serv = nil )
doc . elements . each ( " /NexposeReport/VulnerabilityDefinitions/vulnerability[@id = ' #{ vid } ']] " ) do | vulndef |
title = vulndef . attributes [ 'title' ]
pciSeverity = vulndef . attributes [ 'pciSeverity' ]
cvss_score = vulndef . attributes [ 'cvssScore' ]
cvss_vector = vulndef . attributes [ 'cvssVector' ]
vulndef . elements [ 'references' ] . elements . each ( 'reference' ) do | ref |
if ref . attributes [ 'source' ] == 'BID'
refs [ 'BID-' + ref . text ] = true
elsif ref . attributes [ 'source' ] == 'CVE'
# ref.text is CVE-$ID
refs [ ref . text ] = true
elsif ref . attributes [ 'source' ] == 'MS'
refs [ 'MSB-MS-' + ref . text ] = true
end
end
refs [ 'NEXPOSE-' + vid . downcase ] = true
vuln = framework . db . find_or_create_vuln (
:host = > host ,
:service = > serv ,
:name = > 'NEXPOSE-' + vid . downcase ,
:data = > title )
rids = [ ]
refs . keys . each do | r |
rids << framework . db . find_or_create_ref ( :name = > r )
end
vuln . refs << ( rids - vuln . refs )
end
end
end
#
# Plugin initialization
#
def initialize ( framework , opts )
super
add_console_dispatcher ( NexposeCommandDispatcher )
banner = [ " 0a205f5f5f5f202020202020202020202020205f20202020205f205f5f5f5f5f2020205f2020205f20202020205f5f20205f5f2020202020202020202020202020202020202020200a7c20205f205c205f5f205f205f205f5f20285f29205f5f7c207c5f5f5f20207c207c205c207c207c205f5f5f5c205c2f202f5f205f5f2020205f5f5f20205f5f5f20205f5f5f200a7c207c5f29202f205f60207c20275f205c7c207c2f205f60207c20202f202f20207c20205c7c207c2f205f205c5c20202f7c20275f205c202f205f205c2f205f5f7c2f205f205c0a7c20205f203c20285f7c207c207c5f29207c207c20285f7c207c202f202f2020207c207c5c20207c20205f5f2f2f20205c7c207c5f29207c20285f29205c5f5f205c20205f5f2f0a7c5f7c205c5f5c5f5f2c5f7c202e5f5f2f7c5f7c5c5f5f2c5f7c2f5f2f202020207c5f7c205c5f7c5c5f5f5f2f5f2f5c5f5c202e5f5f2f205c5f5f5f2f7c5f5f5f2f5c5f5f5f7c0a20202020202020202020207c5f7c20202020202020202020202020202020202020202020202020202020202020202020207c5f7c202020202020202020202020202020202020200a0a0a " ] . pack ( " H* " )
# Do not use this UTF-8 encoded high-ascii art for non-UTF-8 or windows consoles
lang = Rex :: Compat . getenv ( " LANG " )
if ( lang and lang =~ / UTF-8 / )
# Cygwin/Windows should not be reporting UTF-8 either...
# (! (Rex::Compat.is_windows or Rex::Compat.is_cygwin))
banner = [ " 202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020200a20e29684e29684e29684202020e29684e29684202020202020202020202020e29684e29684e296842020e29684e29684e2968420202020202020202020202020202020202020202020202020202020202020202020202020202020200a20e29688e29688e29688202020e29688e2968820202020202020202020202020e29688e2968820e29684e29688e296882020202020202020202020202020202020202020202020202020202020202020202020202020202020200a20e29688e29688e29680e296882020e29688e29688202020e29684e29688e29688e29688e29688e296842020202020e29688e29688e29688e2968820202020e29688e29688e29684e29688e29688e29688e2968420202020e29684e29688e29688e29688e29688e29684202020e29684e29684e29688e29688e29688e29688e29688e29684202020e29684e29688e29688e29688e29688e2968420200a20e29688e2968820e29688e2968820e29688e296882020e29688e29688e29684e29684e29684e29684e29688e296882020202020e29688e296882020202020e29688e29688e296802020e29680e29688e296882020e29688e29688e296802020e29680e29688e296882020e29688e29688e29684e29684e29684e2968420e296802020e29688e29688e29684e29684e29684e29684e29688e29688200a20e29688e296882020e29688e29684e29688e296882020e29688e29688e29680e29680e29680e29680e29680e2968020202020e29688e29688e29688e2968820202020e29688e2968820202020e29688e296882020e29688e2968820202020e29688e29688202020e29680e29680e29680e29680e29688e29688e296842020e29688e29688e29680e29680e29680e29680e29680e29680200a20e29688e29688202020e29688e29688e296882020e29680e29688e29688e29684e29684e29684e29684e29688202020e29688e296882020e29688e29688202020e29688e29688e29688e29684e29684e29688e29688e296802020e29680e29688e29688e29684e29684e29688e29688e296802020e29688e29684e29684e29684e29684e29684e29688e296882020e29680e29688e29688e29684e29684e29684e29684e29688200a20e29680e29680202020e29680e29680e2968020202020e29680e29680e29680e29680e29680202020e29680e29680e296802020e29680e29680e296802020e29688e2968820e29680e29680e29680202020202020e29680e29680e29680e296802020202020e29680e29680e29680e29680e29680e296802020202020e29680e29680e29680e29680e2968020200a20202020202020202020202020202020202020202020202020202020202020e29688e29688202020202020202020202020202020202020202020202020202020202020202020202020200a202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020200a " ] . pack ( " H* " )
end
print ( banner )
print_status ( " Nexpose integration has been activated " )
end
def cleanup
remove_console_dispatcher ( 'Nexpose' )
end
def name
" nexpose "
end
def desc
" Integrates with the Rapid7 Nexpose vulnerability management product "
end
2009-12-01 03:10:16 +00:00
end
end
2017-01-25 16:13:28 +00:00
module Nexpose
class IPRange
def to_json
if @to . present?
" #{ @from } - #{ @to } " . to_json
else
@from . to_json
end
end
end
end