Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Nessus parser for gowitness #123

Merged
merged 1 commit into from
Feb 20, 2022

Conversation

randomactsofsecurity
Copy link
Contributor

As mentioned in #69 added the nessus parser into gowitness.

Used your parser at https://gist.github.com/leonjza/bb977e98eac9565fae2aa177e498d9b8

I've made a couple of default assumptions based on looking over some nessus XML files.

First, the "best" plugin for identifying web servers appears to be the "Service Detection" plugin.

Next, filtering the service name off of "www" and "https" appears to get most of the web servers in my analysis. However, several VPN clients have special service names and I had to add in another filter of plugin output contains "web server" to catch the rest of the items.

If there's a better plugin to use it should be easy enough to modify this code. Using plugin IDs might have been more clean, but the name seems fine.

I also required need for a plugin search in this code (matching on "Service Detection" ) because it seems like a waste of resources to search through the entire XML and end up with a map full of thousands of duplicates. That's the reasoning behind it.

@leonjza
Copy link
Member

leonjza commented Jan 26, 2022

Great thank you! 🙌

@leonjza leonjza merged commit e1923bb into sensepost:master Feb 20, 2022
@randomactsofsecurity randomactsofsecurity deleted the nessusparse branch February 22, 2022 02:38
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

2 participants