I'm planning to develop a module to search and obtain the credentials of a database GUI client. Anyhow the credentials found may be limited, for example a secure deployment of a DB should only allow access form localhost on the root user. My question is that the IP related to the credentials, what should it be? If I leave 127.0.0.1 it may be a… Show more
Ask Rapid7 Community and Blog
Loading...
Featured Space
Loading...
Rapid7 Community Site Help
Having trouble accessing your Rapid7 Community account or resetting your password? Not sure where to post your question? Find help on using the Rapid7 Community here.
Popular Content
Loading...
- Custom Default Password Vulnerability
- How to add a third column, asset count, to an existing SQL query?
- Cannot access Nexpose web portal
- Scan Template Tweaking - Max Scan Processes Simultaneously
- Discovery of ePO Assets in Nexpose
- Mirai FAQ: When IoT Attacks
- SQL report with Asset Group and its Assets
- [oss-security] CVE-2016-5195 "Dirty COW" Linux kernel privilege escalation vulnerability, under active exploit
- Ruby - Add Multiple Assets to site and Audit Report
- SQL Query Export Example: Credential status
Popular Tags
Loading...
Newest Members
Loading...
Featured Blog Posts
Loading...
Loading...
| Subject | Author | ||
|---|---|---|---|
| NCSAM: The Danger of Criminalizing Curiosity 15 hours ago in Information Security |
by Amanda Fountain
|
|
|
| Discovery of ePO Assets in Nexpose 14 hours ago in Nexpose |
by Vanessa MacDougal
|
|
|
| Mirai FAQ: When IoT Attacks 2 days ago in Information Security |
by todb
|
|
|
| Nexpose integrates with McAfee ePO and DXL: The first unified vulnerability management solution for Intel Security customers! 2 days ago in Nexpose |
by Nathan Palanov
|
|
|
| Multiple Bluetooth Low Energy (BLE) Tracker Vulnerabilities 2 days ago in Information Security |
by todb
|
|
|
Loading...
Recent activity around the Rapid7 Community
Filtered by:All Items
Social News
- Jay Rosenberger achieved level 1 in the Mission:
Trendsetter
- brian.w.gray achieved level 5 in the Mission:
Validator
- mr.moon achieved level 1 in the Mission:
Trendsetter
- Jay Rosenberger achieved level 1 in the Mission:
Helper
- Samuel Boateng achieved level 1 in the Mission:
Trendsetter
- Ken Mizota achieved level 1 in the Mission:
Helper
- smaske achieved level 63 in the Mission:
Responder
- Adrian Czebiniak achieved level 1 in the Mission:
Helper
- jaldridge achieved level 1 in the Mission:
Helper
- maria_d completed a Quest:
Helpful
View More
[oss-security] CVE-2016-5195 "Dirty COW" Linux kernel privilege escalation vulnerability, under active exploit Do we have any vulnerability check for this? If not how much time will it take to release the vuln check. Also is there any way we can make the vuln check through XML file and push it to all the Nexpose instances? Thanks ~XM
Latest Likes
- brian.w.gray likes zeroorone's reply Re: Ruby - Add Multiple Assets to site and Audit Report
- brian.w.gray likes Vanessa MacDougal's blog post Discovery of ePO Assets in Nexpose
- zeroorone likes jnicoara11's reply Re: How to add a third column, asset count, to an existing SQL query?
- jnicoara11 likes zeroorone's reply Re: How to add a third column, asset count, to an existing SQL query?
- brian.w.gray likes Greg Wiseman's reply Re: Custom Default Password Vulnerability
- Greg Wiseman likes Brandon Koelle's reply Re: Custom Default Password Vulnerability
- zeroorone likes myra's reply Re: SQL report with Asset Group and its Assets
- Scott Meyer likes royhodgman's blog post NCSAM: You Should Use a Password Manager
- chris288 likes xyclops M's question [oss-security] CVE-2016-5195 "Dirty COW" Linux kernel privilege escalation vulnerability, under active exploit
- chris288 likes mattspierce's reply Re: [oss-security] CVE-2016-5195 "Dirty COW" Linux kernel privilege escalation vulnerability, under active exploit
Matters Most
I'm trying to add a custom vulnerability check for a specific username and password that are the defaults on a set of software and devices. I have been through the documentation on the community on this subject and have, what I believe, to be a decent grasp on it. However, I am running into it not functioning and would like someone with more… (Show moreShow less)
in Information SecurityLike (2)
Matters Most
As a corporate network grows and new locations are opened up, it becomes increasingly difficult for companies to keep track of and understand their total asset count and the associated risk exposure. Nexpose lets you easily discover all of your assets before a scan, but if that information is already in a great asset management tool like McAfee… (Show moreShow less)
Sadly my new company doesn't use ePO but glad you have integrated! wish I could still take advantage of this.
Matters Most
If you’ve ever been irritated with endpoint detection being a black box and SIEM detection putting the entire onus on you, don’t think you had unreasonable expectations; we have all wondered why solutions were only built at such extremes. As software has evolved and our base expectations with it, a lot more people have started to wonder why it… (Show moreShow less)
in InsightIDRLike (1)
SIEM doesn't have to be as complicated as legacy systems made it. i cant wait to maybe one day move to a product that works the way I believe it should.
Matters Most
Unless you've been blessed with some long DNS TTLs, you probably noticed that some name-brand chunks of the Internet seemed to go missing on Friday, October 21, including Twitter, GitHub, and Pandora. Over the weekend, it became clear that this was another (yes, another) IoT-based denial-of-service attack, where many thousands of devices with… (Show moreShow less)
in Information SecurityLike (0)
I wonder which incident, breach or attack will force us to look at finally implementing DNSSec and other technologies meant to prevent some of the root causes.
People Updates
- Chandy Bilugu, richard van Schaijik, Dave Rideout and 7 others updated profile information
Top Participants
Loading...
Loading...
- What's the best way to store MySQL credentials?
- Re: Custom Default Password Vulnerability
- Re: [oss-security] CVE-2016-5195 "Dirty COW" Linux kernel privilege escalation vulnerability, under active exploit
- Re: Cannot access Nexpose web portal
- Re: Report on missing patches
- Re: Scan Template Tweaking - Max Scan Processes Simultaneously
- Re: Filter on Metasploit Exploit Skill Necessary
- Re: How to add a third column, asset count, to an existing SQL query?
- Re: Ruby - Add Multiple Assets to site and Audit Report
- Discovery of ePO Assets in Nexpose in Nexpose
@Rapid7
Loading...
